Network Security for CompTIA Network+ (N10-006)
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size815.1 MB
- Uploaded Bysumi1
- Downloads1073
- Last checkedJun. 15th '18
- Date uploadedJun. 20th '17
- Seeders 15
- Leechers1
This course covers every objective in CompTIA Network+ (N10-006) domain 3.0, Network Security. The student learns the basics of information security and picks up industry best practices that he or she can apply immediately on the job
Files:
Network Security for CompTIA Network+ (N10-006) 01. Understanding Network Security Risks- 01. Overview.mp4 (6.7 MB)
- 02. Case Study Network.mp4 (4.2 MB)
- 03. Uptime vs. Availability.mp4 (4.7 MB)
- 04. DR vs. Business Continuity.mp4 (3.8 MB)
- 05. Risk.mp4 (3.1 MB)
- 06. Critical Nodes and Assets.mp4 (2.9 MB)
- 07. Avoiding a Single Point of Failure.mp4 (8.1 MB)
- 08. Data Breaches.mp4 (6.4 MB)
- 09. DR Standards and Policies.mp4 (3.2 MB)
- 10. Demo 1 Reviewing Security Plan Documents.mp4 (8.2 MB)
- 11. Proactive Network Protection.mp4 (3.8 MB)
- 12. Demo 2 Using Nessus.mp4 (13.9 MB)
- 13. Case Study Network, Revisited.mp4 (2.5 MB)
- 14. For Further Learning.mp4 (942.2 KB)
- 15. Summary.mp4 (1.7 MB)
- 01. Overview.mp4 (6.8 MB)
- 02. Denial of Service.mp4 (11.6 MB)
- 03. Distributed Denial of Service.mp4 (5.5 MB)
- 04. IRC and LOIC.mp4 (3.8 MB)
- 05. Smurf Attack.mp4 (3.6 MB)
- 06. ReflectionAmplification Attack.mp4 (4.3 MB)
- 07. Ethernet Protocol Abuse.mp4 (12.4 MB)
- 08. Man-in-the-middle Attack.mp4 (2.0 MB)
- 09. The Importance of ARP.mp4 (3.2 MB)
- 10. SYN Flood Attack.mp4 (2.0 MB)
- 11. VLAN Hopping and Brute Force Attacks.mp4 (7.6 MB)
- 12. Demo 1 Executing an MITM Attack.mp4 (8.3 MB)
- 13. Human Factors.mp4 (968.3 KB)
- 14. Compromised System.mp4 (4.7 MB)
- 15. Demo 2 Cracking Passwords.mp4 (10.9 MB)
- 16. For Further Learning.mp4 (1.2 MB)
- 17. Summary.mp4 (2.1 MB)
- 01. Overview.mp4 (5.8 MB)
- 02. Evil Twin.mp4 (8.0 MB)
- 03. Wardriving and Warchalking.mp4 (10.7 MB)
- 04. Understanding Wi-Fi Statistics.mp4 (12.0 MB)
- 05. Bluejacking and Bluesnarfing.mp4 (3.6 MB)
- 06. WEPWPAWPS Vulnerabilities.mp4 (8.6 MB)
- 07. WLAN Protection Mechanisms.mp4 (6.3 MB)
- 08. Demo 1 Introducing Wi-Fi Monitoring Tools.mp4 (7.7 MB)
- 09. ClientServer Vulnerabilities.mp4 (8.1 MB)
- 10. Open Ports.mp4 (4.1 MB)
- 11. Unsecure Protocols.mp4 (3.9 MB)
- 12. Verifying File Integrity.mp4 (6.8 MB)
- 13. TEMPEST.mp4 (2.0 MB)
- 14. Demo 2 Exposing Unsecure Protocols.mp4 (20.6 MB)
- 15. For Further Learning.mp4 (1.1 MB)
- 16. Summary.mp4 (1.7 MB)
- 01. Overview.mp4 (6.4 MB)
- 02. Security Policies.mp4 (11.8 MB)
- 03. Demo 1 Investigating Security Policies.mp4 (32.6 MB)
- 04. Switch Port Security.mp4 (17.7 MB)
- 05. VLANs.mp4 (6.2 MB)
- 06. Demo 2 Experimenting with VLANs.mp4 (7.9 MB)
- 07. Access Lists.mp4 (12.2 MB)
- 08. Web Content Filtering.mp4 (6.0 MB)
- 09. Wi-Fi Security Protocols.mp4 (5.9 MB)
- 10. IEEE 802.1X.mp4 (2.7 MB)
- 11. Other Wi-Fi Security Options.mp4 (2.5 MB)
- 12. For Further Learning.mp4 (676.4 KB)
- 13. Summary.mp4 (1.6 MB)
- 01. Overview.mp4 (5.6 MB)
- 02. Services.mp4 (13.8 MB)
- 03. Malware and Anti-malware Software.mp4 (10.5 MB)
- 04. Demo 1 Configuring Services and Anti-malware.mp4 (13.6 MB)
- 05. Secure Protocols.mp4 (4.5 MB)
- 06. FTPS vs. SFTP.mp4 (6.5 MB)
- 07. How TLSSSL Works.mp4 (2.8 MB)
- 08. Hashing Functions.mp4 (3.7 MB)
- 09. Demo 2 Hashing and TLS in Action.mp4 (12.7 MB)
- 10. Definition Authentication.mp4 (1.1 MB)
- 11. User Authentication Basics.mp4 (6.4 MB)
- 12. User Authentication Protocols.mp4 (4.2 MB)
- 13. For Further Learning.mp4 (1.1 MB)
- 14. Summary.mp4 (888.3 KB)
- 01. Overview.mp4 (4.1 MB)
- 02.Physical Security Basics.mp4 (9.2 MB)
- 03. Mantraps.mp4 (5.7 MB)
- 04. Network Closets.mp4 (16.9 MB)
- 05. Video Monitoring.mp4 (10.1 MB)
- 06. Door Access Controls.mp4 (8.1 MB)
- 07. Biometrics.mp4 (4.3 MB)
- 08. For Further Learning.mp4 (1.5 MB)
- 09. Summary.mp4 (2.4 MB)
- 01. Overview.mp4 (6.8 MB)
- 02. Firewall Basics.mp4 (9.3 MB)
- 03. Firewall Types.mp4 (8.0 MB)
- 04. Unified Threat Management.mp4 (3.4 MB)
- 05. Demo 1 Managing Host-based Firewalls.mp4 (13.1 MB)
- 06. Zones of Trust.mp4 (4.6 MB)
- 07. Firewall Placement.mp4 (3.5 MB)
- 08. Routed vs. Virtual Wire Firewall Interfaces.mp4 (4.0 MB)
- 09. Access Control Lists.mp4 (2.5 MB)
- 10. Demo 2 Configuring ACL Rules.mp4 (20.4 MB)
- 11. For Further Learning.mp4 (1.6 MB)
- 12. Summary.mp4 (2.7 MB)
- 01. Overview.mp4 (5.9 MB)
- 02. Network Access Control Basics.mp4 (10.2 MB)
- 03. NAC Agent Software.mp4 (6.1 MB)
- 04. Network Access Protection (NAP).mp4 (6.7 MB)
- 05. Cisco NAC.mp4 (9.3 MB)
- 06. Demo 1 Configuring NAP DHCP Enforcement.mp4 (17.5 MB)
- 07. Demo 2 Testing NAP.mp4 (4.5 MB)
- 08. Case Study Network, Revisited.mp4 (2.3 MB)
- 09. For Further Learning.mp4 (2.2 MB)
- 10. Summary.mp4 (2.1 MB)
- 01. Overview.mp4 (3.7 MB)
- 02. A Personal Story.mp4 (5.6 MB)
- 03. Defining Computer Forensics.mp4 (2.3 MB)
- 04. Forensic Concepts.mp4 (10.8 MB)
- 05. Incident Response Policy.mp4 (3.1 MB)
- 06. Evidence and Data Collection.mp4 (2.3 MB)
-
Code:
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.zer0day.to:1337/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://eddie4.nl:6969/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.coppersurfer.tk:6969
- udp://tracker.grepler.com:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://shadowshq.yi.org:6969/announce
- http://tracker.filetracker.pl:8089/announce
- udp://p4p.arenabg.com:1337/announce