zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeCoursesOnline.Me] Pluralsight - Advanced Cyber Defense Analysis with Wireshark
magnet:?xt=urn:btih:356800d24ae74710a25b2138bdaca31c960a7c3a&dn=[FreeCoursesOnline.Me] Pluralsight - Advanced Cyber Defense Analysis with Wireshark
磁力链接详情
Hash值:
356800d24ae74710a25b2138bdaca31c960a7c3a
点击数:
176
文件大小:
703.43 MB
文件数量:
40
创建日期:
2023-12-31 22:48
最后访问:
2024-12-23 21:19
访问标签:
FreeCoursesOnline
Me
Pluralsight
-
Advanced
Cyber
Defense
Analysis
with
Wireshark
文件列表详情
02. Validating Firewall Rules/01. Module Introduction.mp4 4.12 MB
02. Validating Firewall Rules/02. Setting the Stage.mp4 2.74 MB
02. Validating Firewall Rules/03. Creating a Learning Environment.mp4 4.24 MB
02. Validating Firewall Rules/04. Reviewing Common Attack Types.mp4 8.32 MB
02. Validating Firewall Rules/05. Common Firewall Rule Misconfigurations.mp4 6.83 MB
02. Validating Firewall Rules/06. Briefing Wireshark Features for Analysis.mp4 15.62 MB
02. Validating Firewall Rules/07. Demo - Basic Wireshark and Firewall Displays.mp4 22.27 MB
02. Validating Firewall Rules/08. Demo - Discovery Scans of the Inside Network.mp4 25.67 MB
02. Validating Firewall Rules/09. Demo - Port Scans to Specific Host (Common Techniques).mp4 28.05 MB
02. Validating Firewall Rules/10. Demo - Port Scans and DoS Attack (Alternative Techniques).mp4 48.81 MB
02. Validating Firewall Rules/11. Demo - Show Common Ruleset Problems.mp4 53.03 MB
02. Validating Firewall Rules/12. Summary.mp4 2.35 MB
03. Investigating Unsecure Traffic/01. Module Introduction.mp4 2.38 MB
03. Investigating Unsecure Traffic/02. Covering Common Insecure Network Protocols.mp4 5.89 MB
03. Investigating Unsecure Traffic/03. Reviewing Wireshark Features for Traffic Analysis.mp4 14.38 MB
03. Investigating Unsecure Traffic/04. Demo - File Transfer Protocol (FTP).mp4 59.88 MB
03. Investigating Unsecure Traffic/05. Demo - Telnet.mp4 39.62 MB
03. Investigating Unsecure Traffic/06. Demo - Hypertext Transfer Protocol (HTTP).mp4 21.01 MB
03. Investigating Unsecure Traffic/07. Demo - Simple Mail Transfer Protocol (SMTP).mp4 24.89 MB
03. Investigating Unsecure Traffic/08. Demo - Internet Message Access Protocol (IMAP).mp4 25.07 MB
03. Investigating Unsecure Traffic/09. Demo - Post Office Protocol (POP).mp4 13.64 MB
03. Investigating Unsecure Traffic/10. Summary.mp4 1.88 MB
1. Course Overview/1. Course Overview.mp4 5.17 MB
4. Performing Object Assembly and Export/1. Module Introduction.mp4 1.94 MB
4. Performing Object Assembly and Export/2. Working up to Object Extraction.mp4 28.1 MB
4. Performing Object Assembly and Export/3. Demo - File Transfer Protocol (FTP).mp4 27.47 MB
4. Performing Object Assembly and Export/4. Demo - Hypertext Transfer Protocol (HTTP).mp4 47.52 MB
4. Performing Object Assembly and Export/5. Demo - Simple Mail Transfer Protocol (SMTP).mp4 24.6 MB
4. Performing Object Assembly and Export/6. Demo - Internet Message Access Protocol (IMAP).mp4 16.94 MB
4. Performing Object Assembly and Export/7. Demo - Post Office Protocol (POP).mp4 9.27 MB
4. Performing Object Assembly and Export/8. Demo - Server Message Block (SMB).mp4 14.68 MB
4. Performing Object Assembly and Export/9. Summary.mp4 1.44 MB
5. Analyzing Network Traffic with tshark/1. Module Introduction.mp4 1.81 MB
5. Analyzing Network Traffic with tshark/2. Reviewing tshark Uses.mp4 22.77 MB
5. Analyzing Network Traffic with tshark/3. Demo - tshark Basics.mp4 30.87 MB
5. Analyzing Network Traffic with tshark/4. Demo - tshark Statistics.mp4 8.68 MB
5. Analyzing Network Traffic with tshark/5. Demo - tshark Stream Following.mp4 13.63 MB
5. Analyzing Network Traffic with tshark/6. Demo - tshark Decode As.mp4 10.24 MB
5. Analyzing Network Traffic with tshark/7. Demo - tshark Object Exporting.mp4 6.49 MB
5. Analyzing Network Traffic with tshark/8. Summary.mp4 1.16 MB
其他位置