Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Znajdź zawartość

Wyświetlanie wyników dla tagów 'bock' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Poszukiwania / prośby
    • Generowanie linków
    • Szukam
  • DSTeam no Limits (serwery bez limitów!)
  • Download
    • Kolekcje
    • Filmy
    • Muzyka
    • Gry
    • Programy
    • Ebooki
    • GSM
    • Erotyka
    • Inne
  • Hydepark
  • UPandDOWN-Lader Tematy

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 5 wyników

  1. CCNA Security (210-260) Cert Prep: 3 VPN With Lisa Bock Duration: 1:27:23 | Video: h264, 1280x720 | Audio: AAC, 44100 Hz, 2 Ch | 228 MB Genre: eLearning | Language: English | Skill Level: Intermediate Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Topics include: Using Packet TracerReviewing VPN topologies and componentsEncapsulating security payload protocolVPN configurationHairpin and split tunnel VPNClientless SSL VPN and AnyConnect SSL VPNEndpoint posture assessmentPreparing sites for an IPsec VPN Download From NitroFlare http://nitroflare.com/view/DE1B629A4A11509/CCNASecurity210260CertPrep3VPN.rar Download From UploadGig https://uploadgig.com/file/download/55f1f8519bE00d83/CCNASecurity210260CertPrep3VPN.rar Download From Rapidgator https://rapidgator.net/file/5ad823d62b5be4bbceb86c6dbc909257/CCNASecurity210260CertPrep3VPN.rar.html
  2. Ethical Hacking: Social Engineering With Lisa Bock Size: 287 MB | Duration: 1h 18m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Intermediate | Language: English Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www. eccouncil. org/programs/certified-ethical-hacker-ceh/. Topics include: * Visualizing the victim * Recognizing an attack * Using charm, power, and influence * Manipulating with social media * Preventing insider attacks * Stealing identities * Pen testing with social engineering * Taking countermeasures Download From BigFile https://www.bigfile.to/file/X6wweRyyS5VU/LcEthicalHackSclEngnr.rar Download From NitroFlare http://nitroflare.com/view/BE35D70E1CAF74E/LcEthicalHackSclEngnr.rar Download From Rapidgator http://rapidgator.net/file/2d6281f1cf936968bcb55427cecc4aec/LcEthicalHackSclEngnr.rar.html
  3. Foundations of IT Security: Network Security With Lisa Bock Size: 277MB | Duration: 1h 37m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www. microsoft. com/learning/en-us/exam-98-367. aspx for more information. Topics include: * Implementing secure content management (SCM) * Implementing unified threat management (UTM) * Introducing VLANs * NAT addressing * Network sniffing * Understanding common attack methods, such as password attacks * Protecting clients with antivirus software * Implementing physical security Download From NitroFlare http://www.nitroflare.com/view/6422695CB4E4084/xidau123_LcFoundITSecNetworkSecur.rar Download From Rapidgator http://rapidgator.net/file/39c4351763c74d12e58c7a5f7f585181/xidau123_LcFoundITSecNetworkSecur.rar.html
  4. Foundations of IT Security: Operating System Security With Lisa Bock Size: 221MB | Duration: 1h 23m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, Foundations of IT Security series creator Lisa Bock will also review user authentication, assigning permissions and Active Directory, along with creating audit policies, and how you can protect servers and email. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See _https://www. microsoft. com/learning/en-us/exam-98-367. aspx for more information. Topics include: * Creating strong passwords * Understanding biometric security * Adjusting permission behavior * Enabling auditing * OS hardening * Using the Microsoft Baseline Security Analyzer * Protecting email Download From NitroFlare http://www.nitroflare.com/view/12F54F7CF255337/xidau123_ITsecOperateSysFun.rar Download From Rapidgator http://rapidgator.net/file/dc417cb755625a1749796cafa0c6a672/xidau123_ITsecOperateSysFun.rar.html
  5. Essentials of Cryptography and Network Security With Lisa Bock Size: 320MB | Duration: 1h 45m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Intermediate | Language: English Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Topics include: * Understanding why encryption is necessary * Comparing passive and active network attacks * Reviewing the terminology and history of cryptography * Using symmetric encryption * Dissecting block and stream [beeep]hers * Dissecting the public-key algorithms * Creating key pairs * Understanding passwords, hash, salt, and rainbow tables * Exploring Secure Sockets Layer * Investigating email and IP security Download From Keep2Share http://k2s.cc/file/470f19c44f5b5/EsseCryptogrNetworkSecurt.part1.rar http://k2s.cc/file/1cb3ae89bdd2a/EsseCryptogrNetworkSecurt.part2.rar http://k2s.cc/file/a1c57360a8ae2/EsseCryptogrNetworkSecurt.part3.rar http://k2s.cc/file/410016f150c78/EsseCryptogrNetworkSecurt.part4.rar Download From NiroFlare http://www.nitroflare.com/view/0285F681BCA065B/EsseCryptogrNetworkSecurt.part1.rar http://www.nitroflare.com/view/DFD850058586B6B/EsseCryptogrNetworkSecurt.part2.rar http://www.nitroflare.com/view/AFA8D589FCFE75C/EsseCryptogrNetworkSecurt.part3.rar http://www.nitroflare.com/view/F89156C967BC7BC/EsseCryptogrNetworkSecurt.part4.rar Download From RapidGator http://rapidgator.net/file/52599427e64d63604c3cf0c8a26841ed/EsseCryptogrNetworkSecurt.part1.rar.html http://rapidgator.net/file/66cec1b8c167da53d699b5b649a87fd6/EsseCryptogrNetworkSecurt.part2.rar.html http://rapidgator.net/file/77ea236f99e97e57681b425392107b77/EsseCryptogrNetworkSecurt.part3.rar.html http://rapidgator.net/file/ebd4a1f13c0ce6477e97351025958c47/EsseCryptogrNetworkSecurt.part4.rar.html
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.