Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Znajdź zawartość

Wyświetlanie wyników dla tagów 'Securing' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Poszukiwania / prośby
    • Generowanie linków
    • Szukam
  • DSTeam no Limits (serwery bez limitów!)
  • Download
    • Kolekcje
    • Filmy
    • Muzyka
    • Gry
    • Programy
    • Ebooki
    • GSM
    • Erotyka
    • Inne
  • Hydepark
  • UPandDOWN-Lader Tematy

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 22 wyników

  1. pdf | 13.69 MB | English| Isbn:9781501520402 | Author: Todd G. Shipley, Art Bowker | Year: 2024 Description: https://fileaxa.com/e4wh1fuyi51z https://ddownload.com/meueibkkqz8h https://rapidgator.net/file/c9529e0297cc550446f745758d47da31/ https://turbobit.net/vlzfes0t5hmm.html
  2. Free Download Securing Microsoft 365 Messaging Environments (2024) Released 10/2024 By Robert McMillen MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 2h 21m | Size: 366 MB Microsoft 365 has implemented three products that include security, protection, and compliance websites. This course will introduce you to all three systems so that you'll be able to create a functional and secure messaging system. In this course, Securing Microsoft 365 Messaging Environments, you'll gain the ability to review and create security policies. First, you'll explore the Exchange Admin Center. Next, you'll discover how to enable Microsoft threat protection into your projects. Finally, you'll learn how to threat protection in user emails. When you're finished with this course, you'll have the skills to open up a new Microsoft 365 exchange environment and secure it using the provided tools. Homepage https://www.pluralsight.com/courses/securing-microsoft-365-messaging-environments Screenshot Rapidgator https://rg.to/file/5ebfdaf57274f00e94ef1c29b08079a9/twlhc.rar.html Fikper Free Download https://fikper.com/KEMhQJ5Wjd/twlhc.rar.html No Password - Links are Interchangeable
  3. Free Download Securing Generative AI By Omar Santos Released 10/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 3h 31m | Size: 846 MB Course Outline Securing Generative AI: Introduction 3m Learning objectives 1m 18s 1.1 Understanding the Significance of LLMs in the AI Landscape 7m 6s 1.2 Exploring the Resources for this Course - GitHub Repositories and Others 2m 54s 1.3 Introducing Retrieval Augmented Generation (RAG) 12m 25s 1.4 Understanding the OWASP Top-10 Risks for LLMs 5m 46s 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework 5m 39s Learning objectives 1m 2s 2.1 Defining Prompt Injection Attacks 11m 42s 2.2 Exploring Real-life Prompt Injection Attacks 3m 57s 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input 10m 5s 2.4 Enforcing Privilege Control on LLM Access to Backend Systems 6m 10s 2.5 Best Practices Around API Tokens for Plugins, Data Access, and Function-level Permissions 3m 2s 2.6 Understanding Insecure Output Handling Attacks 3m 22s 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling 4m 43s Learning objectives 47s 3.1 Understanding Training Data Poisoning Attacks 4m 27s 3.2 Exploring Model Denial of Service Attacks 3m 12s 3.3 Understanding the Risks of the AI and ML Supply Chain 8m 34s 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources 12m 46s 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments 16m 5s Learning objectives 1m 4s 4.1 Understanding Sensitive Information Disclosure 2m 53s 4.2 Exploiting Insecure Plugin Design 3m 12s 4.3 Avoiding Excessive Agency 3m 46s Learning objectives 47s 5.1 Understanding Overreliance 5m 17s 5.2 Exploring Model Theft Attacks 4m 57s 5.3 Understanding Red Teaming of AI Models 13m 34s Learning objectives 1m 6s 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration 17m 25s 6.2 Securing Embedding Models 9m 39s 6.3 Securing Vector Databases 12m 1s 6.4 Monitoring and Incident Response 7m 50s Screenshot Rapidgator https://rg.to/file/fbd97167930b0c7667dc998cf9f25bbb/obqjd.Securing.Generative.AI.rar.html Fikper Free Download https://fikper.com/s6pMlDtUm4/obqjd.Securing.Generative.AI.rar.html No Password - Links are Interchangeable
  4. Free Download Securing Azure SQL Managed Instance Released 10/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Beginner | Genre: eLearning | Language: English + subtitle | Duration: 52m | Size: 122 MB As organizations increasingly migrate their data to the cloud, securing databases becomes paramount. This course will teach you deployment options, encryption application, and data privacy measures to secure your Azure SQL Managed Instance. In today's cloud-driven world, safeguarding your data is more critical than ever. As businesses rely on Azure SQL Managed Instance for their data needs, understanding and implementing robust security measures is essential. In this course, Securing Azure SQL Managed Instance, you'll learn to protect your data and ensure compliance within your Azure environment. First, you'll explore the deployment and connectivity options available under security isolation architectures. Next, you'll discover advanced security features like auditing, Advanced Threat Protection, and Microsoft Entra integration for authentication and authorization. Finally, you'll learn how to apply encryption and data privacy measures, including Transport Layer Security, Always Encrypted, dynamic data masking, and row-level security. When you're finished with this course, you'll have the skills and knowledge of securing Azure SQL Managed Instance needed to effectively secure your Azure SQL Managed Instance and manage its security in real-world scenarios. Homepage https://app.pluralsight.com/library/courses/azure-sql-managed-instance-securing/table-of-contents TakeFile https://takefile.link/97pw8twq4jlu/ativz.Securing.Azure.SQL.Managed.Instance.rar.html Rapidgator https://rg.to/file/e04eb72b5e7acdacce0feb12b6bcf49f/ativz.Securing.Azure.SQL.Managed.Instance.rar.html Fikper Free Download https://fikper.com/Fj7joEExwl/ativz.Securing.Azure.SQL.Managed.Instance.rar.html No Password - Links are Interchangeable
  5. Free Download Udemy - Securing AI (with Microsoft Cloud) Published 9/2024 Created by Kuljot Singh Bakshi MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 39 Lectures ( 8h 5m ) | Size: 3.3 GB MS Purview, Identity And Access Management, Microsoft Entra ID, ChatGPT, Microsoft Copilot, Google Gemini What you'll learn: Securing Generative AI like Microsoft Copilot, ChatGPT Securing Predictive AI Learn about MS Purview, Microsoft Entra ID, Microsoft Sentinel, Microsoft Defender Learn about Microsoft Intune, Defender For Cloud Apps, Defender For Endpoint etc. Learn about Cloud Security Posture Management and Cloud Security Hygiene Requirements: Intermediate experience with Microsoft Azure required Intermediate experience with Microsoft Cloud , Office 365 etc. required Description: With the ever increasing experimentation with AI applications like Copilot, ChatGPT and Google Gemini, securing your organization from the threats of these AI workloads has become the need of the hour. In this course we will deep dive into how you can improve your CSPM (Cloud Security Posture Management) and Cloud Security Hygiene with various Microsoft security solutions like Purview for Information Protection and Governance, Defender for Extended Detection and Response, Sentinel for SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation and Response), Microsoft Entra ID for Identity and Access Management etc.The following Microsoft security solutions will be covered in this course:1) Microsoft Entra ID - Cloud-based identity and access management service for secure resource access.2)Microsoft Entra Conditional Access - Centralized policy control for authentication conditions and data/application security.3)Microsoft Defender for Identity - Detects on-premises identity attacks using behavioral analysis and specific threat detections.4)Intune - Cloud-based mobile device and application management service, integrates with Conditional Access for device security.5)Defender for Endpoint - Provides Endpoint Detection and Response (EDR), Threat and Vulnerability Management (TVM), and automated incident investigation/remediation for multiple OS platforms.6)Defender for Cloud Apps - Provides XDR capabilities for SaaS applications, Shadow IT risk management, Info Protection/DLP, and session monitoring/control.7) Defender for Office 365 - Offers XDR capabilities including sandbox detonation, integrated threat intelligence, and attack simulation across various Microsoft 365 services.8) Defender for Cloud - Simplifies detection, automated investigation, and response for Azure resources.9) Microsoft Purview DLP - Implements data loss prevention by defining and applying DLP policies to protect sensitive items across various Microsoft 365 services, Office applications, endpoints, non-Microsoft cloud apps, on-premises file shares, and Power BI.10) Microsoft Purview Information Protection - Protects sensitive data in documents and emails with a built-in, intelligent, unified, and extensible solution.11) Intune Mobile App Management (MAM) - Uses app configuration profiles to deploy or configure apps on unenrolled devices, protecting data within apps when combined with app protection policies.12) Defender for Cloud Apps - Provides security capabilities for cloud applications.13) Microsoft Defender XDR provides a unified detection and response platform (XDR + SIEM) designed to simplify security operations with integrated detection, automated investigation and response across platforms and clouds.14) Microsoft Sentinel is a cloud native SIEM+SOAR solution that integrates with Microsoft Defender XDR and enables you to use UEBA and ML to detect, hunt for, and remediate threats across data sources in your enterprise.Note: Although you might seem a lot of topics not covered in this course as of now, those topics will be added as the course moves forward in due time. Who this course is for: Anyone looking to securely deploy AI into their organization Security Analysts AI Developers SOC engineers DevSecOps Engineers Homepage https://www.udemy.com/course/securing-ai-with-microsoft-cloud/ Rapidgator https://rg.to/file/15fa49af676970682ec3dbd8064aca15/czvbt.Securing.AI.with.Microsoft.Cloud.part1.rar.html https://rg.to/file/1ec1d7cc3c5b2d73765959801f1250a4/czvbt.Securing.AI.with.Microsoft.Cloud.part2.rar.html https://rg.to/file/80e838d8156f025301f0a4bbe2e97cb0/czvbt.Securing.AI.with.Microsoft.Cloud.part3.rar.html https://rg.to/file/ac9d91ad459f0dfd330512ee8e5a8979/czvbt.Securing.AI.with.Microsoft.Cloud.part4.rar.html Fikper Free Download https://fikper.com/6Ba303uygI/czvbt.Securing.AI.with.Microsoft.Cloud.part1.rar.html https://fikper.com/WyjYhL6mZt/czvbt.Securing.AI.with.Microsoft.Cloud.part2.rar.html https://fikper.com/Fj6taeQNZB/czvbt.Securing.AI.with.Microsoft.Cloud.part3.rar.html https://fikper.com/wCcKAguJpn/czvbt.Securing.AI.with.Microsoft.Cloud.part4.rar.html No Password - Links are Interchangeable
  6. Free Download Securing Your Home Office (2024) Released: 09/2024 Duration: 50m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 98 MB Level: Beginner | Genre: eLearning | Language: English Keeping your hardware and information safe and secure is essential when you're working from home. Working from your home office might be a temporary situation or a permanent choice, but regardless of your unique situation, security is key. In this course, join instructor Scott Simpson as he covers the fundamentals of securing your home office, from ensuring the physical security of objects and resources, to digital security of files and staying safe when browsing online. Along the way, get quick tips for maintaining audio and video privacy, securing your mobile devices, and avoiding scams targeted at home workers. Ideal for both seasoned remote workers as well as newer remote workers looking to understand how they can protect themselves and their company's data, this course equips you with practical, easy-to-use strategies to keep your home office safe and secure. Homepage https://www.linkedin.com/learning/securing-your-home-office-24757393 TakeFile https://takefile.link/gm3hx40t2m87/sqqcr.Securing.Your.Home.Office.2024.rar.html Rapidgator https://rg.to/file/9cf4a8a5230d08a69980fa03c74dd9a5/sqqcr.Securing.Your.Home.Office.2024.rar.html Fikper Free Download https://fikper.com/xQa1pIQYOs/sqqcr.Securing.Your.Home.Office.2024.rar.html No Password - Links are Interchangeable
  7. Free Download Securing Django Applications Updated: 09/2024 Duration: 1h 27m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 212 MB Level: Advanced | Genre: eLearning | Language: English The protection of user privacy and data is a clear mandate for business success. In this course, learn how to protect your Django web app using essential security and authentication measures. Using a sample project-a pre-built Django web app and a REST API for that web app-instructor Rudolf Olah shows how to add code that keeps your app safe from cyberattacks. Discover how to add SMS two-factor authentication, set up per-object permissions, and leverage per-group permissions to allow groups of users to access, modify, and delete data. Plus, learn how to create audit logs for compliance, implement zero-knowledge encryption, write a unit test to ensure that server data is fully encrypted for a user, and more. Homepage https://www.linkedin.com/learning/securing-django-applications TakeFile https://takefile.link/bjc921hdnf6u/soobc.Securing.Django.Applications.rar.html Rapidgator https://rg.to/file/713d219a86c5f4f2ad7d014b81550b42/soobc.Securing.Django.Applications.rar.html Fikper Free Download https://fikper.com/TxCGuTTyiA/soobc.Securing.Django.Applications.rar.html No Password - Links are Interchangeable
  8. Securing the IoT: Designing and Testing Size: 428 MB | Duration: 2h 50m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Intermediate | Language: English It is estimated that by 2020, there will be 20 billion IoT devices worldwide. Designing security around these devices is crucial. In this course, Malcolm discusses what some of the security concerns are, and then shows you how to design with these concerns in mind. He covers IoT development and he explains how to test an IoT gateway and IoT devices. Topics include: * Reviewing security issues and recent attacks * Robot security concerns * IoTSF Compliance Framework * LoRa security * Building security into IoT devices * Moving to trusted execution environments * Adding sensors and encryption to Marvin * Generating packets with Paketeer * The cURL tool * Testing home IoT devices Download From UploadGig https://uploadgig.com/file/download/e91BAb10384017c6/xidau123_LcSecurIoTDesignTest.rar Download From NitroFlare http://nitroflare.com/view/70C4337E759B583/xidau123_LcSecurIoTDesignTest.rar Download From Rapidgator http://rapidgator.net/file/5ccdbfce46e2e69feb601ea28832a9c1/xidau123_LcSecurIoTDesignTest.rar.html
  9. AWS Security Operations: Securing Access to Object Storage MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours 13M | 277 MB Genre: eLearning | Language: English This course demonstrates how to utilize AWS security services and features to stay safe and compliant, while deploying S3 storage and CloudFront in the AWS Cloud using recommended security best practices. Designing with a security mindset when considering all aspects of your AWS deployment is essential to ensure your cloud solution follows the best practices in governance, security operations, and acceptable risk. In this course, AWS Security Operations: Securing Access to Object Storage, you'll learn the most up-to-date knowledge of designing your AWS solutions utilizing security best practices. You'll implement AWS S3, Glacier, and CloudFront services while planning for proper security and control. First, you'll begin by exploring storage solutions through Amazon. Next, you'll discover how to protect your corporate data resources when utilizing storage. Finally, you'll dive into the ins and outs CloudFront distributions. When you're finished with this course, you'll have the skills and knowledge needed to setup, secure, and monitor all aspects of AWS object storage and CloudFront. Download link: http://rapidgator.net/file/94251f4d69e04f4208ea50897b7e1743/cxai5.AWS.Security.Operations.Securing.Access.to.Object.Storage.rar.html http://nitroflare.com/view/461BB143C43EC1A/cxai5.AWS.Security.Operations.Securing.Access.to.Object.Storage.rar https://uploadgig.com/file/download/ff598a842Fd8403b/cxai5.AWS.Security.Operations.Securing.Access.to.Object.Storage.rar http://uploaded.net/file/kl0vqrn8/cxai5.AWS.Security.Operations.Securing.Access.to.Object.Storage.rar Links are Interchangeable - No Password - Single Extraction
  10. CNIT 129S - Securing Web Applications English | Size: 1.39 GB Category: Video Training Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code. Major Learning Upon successful completion of this course, the student will be able to: Explain the current state of Web application security Analyze basic application functionality Secure data stores and back-end components Protect users from other users Demonstrate common exploits and patch their root causes Implement servers and firewalls effectively Download link: http://rapidgator.net/file/833aad799fd4bc387c11f101f2f2b500/xbp77.CNIT.129S..Securing.Web.Applications.part1.rar.html http://rapidgator.net/file/c2f3a83e09cce820a7c7d09b2ec3a986/xbp77.CNIT.129S..Securing.Web.Applications.part2.rar.html http://nitroflare.com/view/316591A7D218934/xbp77.CNIT.129S..Securing.Web.Applications.part1.rar http://nitroflare.com/view/36FF06D1D55C8B6/xbp77.CNIT.129S..Securing.Web.Applications.part2.rar https://uploadgig.com/file/download/7cB1b0f05ca94C2F/xbp77.CNIT.129S..Securing.Web.Applications.part1.rar https://uploadgig.com/file/download/364f9A3bDb83c456/xbp77.CNIT.129S..Securing.Web.Applications.part2.rar http://uploaded.net/file/u9t4xi4r/xbp77.CNIT.129S..Securing.Web.Applications.part1.rar http://uploaded.net/file/dz1sla2p/xbp77.CNIT.129S..Securing.Web.Applications.part2.rar Links are Interchangeable - No Password - Single Extraction
  11. Securing Linux Servers MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | 725 MB Genre: eLearning | Language: English Linux is widely used to host critical services in Internet-facing settings. This course will show you how to take control of your servers, assess their vulnerability, and significantly reduce their attack surface by hardening the system. It is a fact of life that any server that connects directly to the Internet can be attacked. In this course, Securing Linux Servers, you'll learn best practices to reduce the attack surface of those systems. First, you'll learn to take control of booting your machines and see how to assess their vulnerability using a range of open-source tools. Next, you'll put into place some simple best practices to harden them and learn the benefits of SELinux in mitigating the potential damage of 0-day vulnerabilities. Finally, you'll learn how to check the integrity of your file system and detect suspicious activity. No training can claim to make your servers 100% secure, but after completing this course, you'll certainly be able to remove the low-hanging fruit from the reach of would-be attackers. The course uses CentOS7 or RHEL7, plus a number of readily-available open-source tools. Download link: http://rapidgator.net/file/8850c9d8dbe3684598a76e06e08a10a9/btlb5.Securing.Linux.Servers.2016.rar.html]btlb5.Securing.Linux.Servers.2016.rar.html http://nitroflare.com/view/22476BCE121FE89/btlb5.Securing.Linux.Servers.2016.rar]btlb5.Securing.Linux.Servers.2016.rar http://uploaded.net/file/0i6uoezy/btlb5.Securing.Linux.Servers.2016.rar]btlb5.Securing.Linux.Servers.2016.rar https://www.bigfile.to/file/tNyggpUsVGqN/btlb5.Securing.Linux.Servers.2016.rar]btlb5.Securing.Linux.Servers.2016.rar Links are Interchangeable - No Password - Single Extraction
  12. Securing Linux Servers Video Training Duration: 4h 24m | Video: h264, yuv420p, 1280x720 30fps | Audio: aac, 44100 Hz, 2 ch | 724 MB Genre: eLearning | Language: English | Project Files Included It is a fact of life that any server that connects directly to the Internet can be attacked. In this course, Securing Linux Servers, you'll learn best practices to reduce the attack surface of those systems. First, you'll learn to take control of booting your machines and see how to assess their vulnerability using a range of open-source tools. Next, you'll put into place some simple best practices to harden them and learn the benefits of SELinux in mitigating the potential damage of 0-day vulnerabilities. Finally, you'll learn how to check the integrity of your file system and detect suspicious activity. No training can claim to make your servers 100% secure, but after completing this course, you'll certainly be able to remove the low-hanging fruit from the reach of would-be attackers. The course uses CentOS7 or RHEL7, plus a number of readily-available open-source tools. Download link: http://uploaded.net/file/joo7k7wy/ewk1m.Securing.Linux.Servers.Video.Training.rar]ewk1m.Securing.Linux.Servers.Video.Training.rar http://rapidgator.net/file/3747e95199e3e1cb46d3306e4588c670/ewk1m.Securing.Linux.Servers.Video.Training.rar.html]ewk1m.Securing.Linux.Servers.Video.Training.rar.html http://nitroflare.com/view/F4AF293E446D1E1/ewk1m.Securing.Linux.Servers.Video.Training.rar]ewk1m.Securing.Linux.Servers.Video.Training.rar http://uploadgig.com/file/download/bd042690b2859411/ewk1m.Securing.Linux.Servers.Video.Training.rar]ewk1m.Securing.Linux.Servers.Video.Training.rar Links are Interchangeable - No Password - Single Extraction
  13. Securing Enterprise LANs Using the Junos OS Training Video HDRips | MP4/AVC, ~247 kb/s | 1280x720 | Duration: 04:07:44 | English: AAC, 125 kb/s (2 ch) | 655 MB Genre: Development / Programming / Security In this project-based Securing Enterprise LANs Using the Junos OS video tutorial series, you'll quickly have relevant skills for real-world applications. Follow along with our expert instructor in this training course to get: Concise, informative and broadcast-quality Securing Enterprise LANs Using the Junos OS training videos delivered to your desktop The ability to learn at your own pace with our intuitive, easy-to-use interface A quick grasp of even the most complex Securing Enterprise LANs Using the Junos OS subjects because they're broken into simple, easy to follow tutorial videos Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Securing Enterprise LANs Using the Junos OS tutorial, online or offline... so you'll know the exact steps for your own projects. Download link: http://rapidgator.net/file/d3fdbbf7024436ff0f0feac63bc308ad/aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar.html]aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar.html http://nitroflare.com/view/9C6DC981BA9BD91/aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar]aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar http://uploaded.net/file/0umsrzvf/aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar]aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar https://www.bigfile.to/file/QBQ5r72sfbYk/aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar]aidza.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar Links are Interchangeable - No Password - Single Extraction
  14. Securing Enterprise LANs Using the Junos OS Training Video HDRips | MP4/AVC, ~247 kb/s | 1280x720 | Duration: 04:07:44 | English: AAC, 125 kb/s (2 ch) | 655 MB Genre: Development / Programming / Security Follow along with our expert instructor in this training course to get: Concise, informative and broadcast-quality Securing Enterprise LANs Using the Junos OS training videos delivered to your desktop The ability to learn at your own pace with our intuitive, easy-to-use interface A quick grasp of even the most complex Securing Enterprise LANs Using the Junos OS subjects because they're broken into simple, easy to follow tutorial videos Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Securing Enterprise LANs Using the Junos OS tutorial, online or offline. so you'll know the exact steps for your own projects. DOWNLOAD http://rapidgator.net/file/b33e593606c557ce5d357abf1bf28bc5/ss2x4.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar.html http://uploaded.net/file/9g0csmby/ss2x4.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar https://www.bigfile.to/file/VqcHYsEgM6Jd/ss2x4.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar http://nitroflare.com/view/86CDD8FBDF08F9A/ss2x4.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar http://uploadgig.com/file/download/fD0Ff59F05ce7a74/ss2x4.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.rar
  15. Securing Enterprise LANs Using the Junos OS Training Video HDRips | MP4/AVC, ~247 kb/s | 1280x720 | Duration: 04:07:44 | English: AAC, 125 kb/s (2 ch) | 655 MB Genre: Development / Programming / Security In this project-based Securing Enterprise LANs Using the Junos OS video tutorial series, you'll quickly have relevant skills for real-world applications. Follow along with our expert instructor in this training course to get: Concise, informative and broadcast-quality Securing Enterprise LANs Using the Junos OS training videos delivered to your desktop The ability to learn at your own pace with our intuitive, easy-to-use interface A quick grasp of even the most complex Securing Enterprise LANs Using the Junos OS subjects because they're broken into simple, easy to follow tutorial videos Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Securing Enterprise LANs Using the Junos OS tutorial, online or offline... so you'll know the exact steps for your own projects. Download link: http://rapidgator.net/file/84701da0c79c18d19ee1259e0c9578e5/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar.html]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar.html http://rapidgator.net/file/0ed117296a4a581ae79a306b3ffd9dcc/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar.html]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar.html http://rapidgator.net/file/0c5cd84db566a2b67ffd530f8e4e5f98/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar.html]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar.html http://nitroflare.com/view/6DEB013216EABB1/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar http://nitroflare.com/view/A84EBA52C83BD0B/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar http://nitroflare.com/view/8F127446DBB9995/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar http://uploaded.net/file/tmj9z5cl/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar http://uploaded.net/file/qwb87lqa/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar http://uploaded.net/file/mw6sf4yg/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar https://www.bigfile.to/file/ECDy2BpYmRJ3/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part1.rar https://www.bigfile.to/file/XpDZ9eXxw6UF/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part2.rar https://www.bigfile.to/file/VedwUpQK22mD/f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar]f8tye.Securing.Enterprise.LANs.Using.the.Junos.OS.Training.Video.part3.rar Links are Interchangeable - No Password - Single Extraction
  16. Lynda - CompTIA A+ Exam Prep (220-902) Part 6: Securing Computers Size: 390 MB | Duration: 0h 55m | Video: AVC (.mp4) 1280x720 25&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English The CompTIA A+ Exam Prep series is a comprehensive six-part series designed to help IT professionals prepare for the CompTIA 220-902 exam, which focuses on operating systems and software. If you're looking to pass the exam for the first time or refresh your skills, this is the series for you. Security is one of the IT pro's chief concerns, and it's a big domain of the 220-902 exam. This course outlines the basic procedures for securing any computer, covering topics such as physical security, password protection, malware detection and prevention, and firewalls. CompTIA expert Mike Meyers also helps you understand how to dispose of data correctly and respond to security incidents. After completing this course and the others in the series, you should feel prepared to ace the exam. Find your testing location and schedule a test at Download link: http://uploaded.net/file/04m7sd7r/k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar]k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar http://rapidgator.net/file/22c1b233979e13e18ef273109b64a335/k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar.html]k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar.html http://nitroflare.com/view/132C3FFB414BC98/k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar]k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar https://www.bigfile.to/file/cYqfpNTj3GAH/k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar]k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar http://www.datafile.com/d/TWpBMk9UYzJPRGcF9/k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar]k3a7j.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar Links are Interchangeable - No Password - Single Extraction
  17. Lynda - CompTIA A+ Exam Prep (220-902) Part 6: Securing Computers Size: 390 MB | Duration: 0h 55m | Video: AVC (.mp4) 1280x720 25&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English The CompTIA A+ Exam Prep series is a comprehensive six-part series designed to help IT professionals prepare for the CompTIA 220-902 exam, which focuses on operating systems and software. Download link: http://uploaded.net/file/t2u9bue1/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part1.rar http://uploaded.net/file/lopdvpf0/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part2.rar http://uploaded.net/file/4m7p8rwd/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part3.rar http://rapidgator.net/file/e575f9190cf821ee28049912c6f6e87a/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part1.rar.html http://rapidgator.net/file/20c8eb71e213f1bc8609a7b9dc7c4de7/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part2.rar.html http://rapidgator.net/file/75097a7af080e2bc6b34a83a1eedd264/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part3.rar.html http://nitroflare.com/view/DEEDC0679FB5C6E/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part1.rar http://nitroflare.com/view/D39EB1B65875C74/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part2.rar http://nitroflare.com/view/39E02EA34C22D7C/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part3.rar https://www.bigfile.to/file/huP5QuaaFTqU/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part1.rar https://www.bigfile.to/file/u99vPRx9DGQF/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part2.rar https://www.bigfile.to/file/k4hGsGZYRkhs/6xo92.Lynda..CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.part3.rar Links are Interchangeable - No Password - Single Extraction
  18. Lynda - CompTIA A+ Exam Prep (220-902) Part 6: Securing Computers Size: 390 MB | Duration: 0h 55m | Video: AVC (.mp4) 1280x720 25&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English The CompTIA A+ Exam Prep series is a comprehensive six-part series designed to help IT professionals prepare for the CompTIA 220-902 exam, which focuses on operating systems and software. If you're looking to pass the exam for the first time or refresh your skills, this is the series for you. Security is one of the IT pro's chief concerns, and it's a big domain of the 220-902 exam. This course outlines the basic procedures for securing any computer, covering topics such as physical security, password protection, malware detection and prevention, and firewalls. CompTIA expert Mike Meyers also helps you understand how to dispose of data correctly and respond to security incidents. After completing this course and the others in the series, you should feel prepared to ace the exam. Find your testing location and schedule a test at Download link: http://uploaded.net/file/5oh8r1lc/i1mxu.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar http://rapidgator.net/file/0f94187911e72253d8f078fac69110bf/i1mxu.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar.html http://nitroflare.com/view/4ECCE27AA01D93A/i1mxu.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar https://www.bigfile.to/file/AaUH8MKvDUBm/i1mxu.CompTIA.A.Exam.Prep.220902.Part.6.Securing.Computers.rar Links are Interchangeable - No Password - Single Extraction
  19. Tutsplus - Securing an AngularJS Application English | 1.5 hours | MP4 | AAC, 44.1KHz, 2Ch | AVC1, 1280x720, 25fps | 832 Mb Genre: eLearning Security is one of the most important parts of writing a web application-perhaps the most important part! While web developers have become proficient in securing conventional web apps, AngularJS (and similarly frameworks) change the game of how we approach security. This course will take an insecure message board application, and progressively harden it against common attacks. DOWNLOAD http://rapidgator.net/file/27c01f75cef026f277bc8c7a9b0b2b41/Securing.part1.rar.html http://rapidgator.net/file/47030bc5ba59f43e2c66c09f28b4a75d/Securing.part2.rar.html http://rapidgator.net/file/26179d82b40a034af288e1b0b3a70ed3/Securing.part3.rar.html http://rapidgator.net/file/f09d3d236524e41539d55c1daf14ae6b/Securing.part4.rar.html http://uploaded.net/file/9u6wfhbg/Securing.part1.rar http://uploaded.net/file/yf4m07w2/Securing.part2.rar http://uploaded.net/file/4rm48295/Securing.part3.rar http://uploaded.net/file/4r1pxsnc/Securing.part4.rar http://www.uploadable.ch/file/RSvQUMf6HSve/Securing.part1.rar http://www.uploadable.ch/file/Tkr5Y9Rrysyw/Securing.part2.rar http://www.uploadable.ch/file/c5ubrKt3hNkH/Securing.part3.rar http://www.uploadable.ch/file/Q2wYtX9wkRqA/Securing.part4.rar http://www.hitfile.net/4Pz2/Securing.part1.rar.html http://www.hitfile.net/4Pfx/Securing.part2.rar.html http://www.hitfile.net/4Q6Z/Securing.part3.rar.html http://www.hitfile.net/4PhP/Securing.part4.rar.html
  20. Tutsplus - Securing an AngularJS Application With Jeremy McPeak 970MB | 10 Lessons | 1.5 hours | MP4 | AAC, 44.1KHz, 2Ch | AVC1, 1280x720, 25fps Genre: E-learning | Jeremy McPeak Security is one of the most important parts of writing a web application-perhaps the most important part! While web developers have become proficient in securing conventional web apps, AngularJS (and similarly frameworks) change the game of how we approach security. This course will take an insecure message board application, and progressively harden it against common attacks. Download From NitroFlare http://www.nitroflare.com/view/0540C413EEE41B5/Securing.AngJS.App.part1.rar http://www.nitroflare.com/view/B0F01B9DE3D191C/Securing.AngJS.App.part2.rar http://www.nitroflare.com/view/0DB4DB38387DCF9/Securing.AngJS.App.part3.rar http://www.nitroflare.com/view/DFB0C1041A76028/Securing.AngJS.App.part4.rar Download From Keep2share http://k2s.cc/file/bf24d3e193b18/Securing.AngJS.App.part1.rar http://k2s.cc/file/8486c62f7581e/Securing.AngJS.App.part2.rar http://k2s.cc/file/2c385a7e96e56/Securing.AngJS.App.part3.rar http://k2s.cc/file/45f0dfebf7cb0/Securing.AngJS.App.part4.rar Download From Rapidgator http://rapidgator.net/file/a5f093916aee016c4048674dbb342633/Securing.AngJS.App.part1.rar.html http://rapidgator.net/file/db3a452feaabcb246fd9ddc2bf483983/Securing.AngJS.App.part2.rar.html http://rapidgator.net/file/7eba4596ae2a73f22abc8862dbd90678/Securing.AngJS.App.part3.rar.html http://rapidgator.net/file/62e95bea35ff0cad18d654a287db931f/Securing.AngJS.App.part4.rar.html
  21. Hacking & Securing PHP Applications English | .MP4, AVC, 1000 kbps, 1280x720 | AAC, 64 kbps, 2 Ch | 463 Mb Genre: eLearning This course teaches how to hack and secure PHP. Owasp top10(A1 to A10) for PHP. This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications. The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely. We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website. The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense. Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe. DOWNLOAD http://rapidgator.net/file/cbf07ef13f04bfb7e934344df138c31f/PHP.part1.rar.html http://rapidgator.net/file/b94a8552ba088975a1cf3fd4f4659ead/PHP.part2.rar.html http://rapidgator.net/file/4db9e9046a8f60e2963d5ed037c85a35/PHP.part3.rar.html http://rapidgator.net/file/52e4c200bc57c704f877ed0f72242151/PHP.part4.rar.html http://rapidgator.net/file/707c52cfbf89f5c1313c9ce78778b428/PHP.part5.rar.html http://uploaded.net/file/icv01vbb/PHP.part1.rar http://uploaded.net/file/02kjb0a0/PHP.part2.rar http://uploaded.net/file/54aux1np/PHP.part3.rar http://uploaded.net/file/f1nt1ash/PHP.part4.rar http://uploaded.net/file/epjeddkt/PHP.part5.rar http://www.uploadable.ch/file/TXnw6qyfCyxf/PHP.part1.rar http://www.uploadable.ch/file/88Qbrfhfe4SM/PHP.part2.rar http://www.uploadable.ch/file/yU3JmRK4nCaD/PHP.part3.rar http://www.uploadable.ch/file/nSf362awgAxr/PHP.part4.rar http://www.uploadable.ch/file/VhzEKChZV4ts/PHP.part5.rar http://www.hitfile.net/2mro/PHP.part1.rar.html http://www.hitfile.net/2mrX/PHP.part2.rar.html http://www.hitfile.net/2mo3/PHP.part3.rar.html http://www.hitfile.net/2moj/PHP.part4.rar.html http://www.hitfile.net/2mkx/PHP.part5.rar.html
  22. InfiniteSkills - Securing Cloud Services Training Video With David Miller Duration: 6.5 hours | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch |783MB Genre: eLearning | Language: English In this Securing Cloud Services training course, expert author David Miller will teach you how to secure and maintain your IT assets in the cloud. This course is designed for the absolute beginner, meaning no experience with cloud services is required. You will start by learning how to secure the infrastructure, including risk assessment and management, sensitive data, and data classification. From there, David will show you how to prepare for cloud use, including web app security, security as a service, and security controls. This video tutorial also teaches you about the cloud services agreement, and what you should consider including in your cloud services agreement. Finally, you will learn how to stay secure in the cloud and maintain your IT assets securely. Once you have completed this computer based training course, you will be fully capable of securing your own IT assets in the cloud. Download From Uploaded http://uploaded.net/file/o4jwlt8j/xidau123_InfSecuClouServ.part1.rar http://uploaded.net/file/ev7f6vgf/xidau123_InfSecuClouServ.part2.rar http://uploaded.net/file/aac4mi9r/xidau123_InfSecuClouServ.part3.rar Download From NitroFlare http://www.nitroflare.com/view/323D085ED21DC20/xidau123_InfSecuClouServ.part1.rar http://www.nitroflare.com/view/2E91D667F439572/xidau123_InfSecuClouServ.part2.rar http://www.nitroflare.com/view/6D659EB6217E09D/xidau123_InfSecuClouServ.part3.rar Download From Rapidgator http://rapidgator.net/file/e97b570c7c8a77fa4589fd97a0c29b61/xidau123_InfSecuClouServ.part1.rar.html http://rapidgator.net/file/559ea5e48804a43851ed2eb5b516893b/xidau123_InfSecuClouServ.part2.rar.html http://rapidgator.net/file/bd480169b175680ba504f46d61f1f7a3/xidau123_InfSecuClouServ.part3.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.