Coursera - Computer Security and Systems Management Specialization

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size2.4 GB
  • Uploaded ByFclab
  • Downloads114
  • Last checkedJun. 10th '23
  • Date uploadedJun. 09th '23
  • Seeders 30
  • Leechers18

Infohash : 48003321319E824E4C6FDD2939F26785F22B6FF9

TO GET DIRECT DOWNLOAD LINKS OR GOOGLE DRIVE LINKS VISIT OUR WEBSITE
FOR MORE PREMIUM COURSERA COURSES VISIT: https://courserhub.com

Coursera - Computer Security and Systems Management Specialization

Computer Security and Systems Management Specialization Practical Application to System Management. Learn how to securely design and manage enterprise systems utilizing mainstream operating systems.

Instructors: Greg Williams
Last Update: 12/2022

Files:

[CourserHub.com] Coursera - Computer Security and Systems Management Specialization 0. Websites you may like
  • [CourserHub.com].url (0.1 KB)
  • Readme.txt (0.0 KB)
  • enterprise-system-management-security 01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t 01_welcome
    • 04_introduction.en.srt (5.7 KB)
    • 04_introduction.en.txt (3.7 KB)
    • 04_introduction.mp4 (25.7 MB)
    • 05_about-the-instructor.en.srt (10.4 KB)
    • 05_about-the-instructor.en.txt (6.2 KB)
    • 05_about-the-instructor.mp4 (155.3 MB)
    02_personal-computing-vs-enterprise-computing
    • 01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.srt (8.0 KB)
    • 01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.txt (4.9 KB)
    • 01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4 (39.1 MB)
    • 02_what-is-personal-computing.en.srt (6.8 KB)
    • 02_what-is-personal-computing.en.txt (4.2 KB)
    • 02_what-is-personal-computing.mp4 (29.0 MB)
    • 03_what-is-enterprise-computing.en.srt (12.4 KB)
    • 03_what-is-enterprise-computing.en.txt (7.5 KB)
    • 03_what-is-enterprise-computing.mp4 (52.1 MB)
    • 04_what-roles-are-there-in-system-management.en.srt (6.4 KB)
    • 04_what-roles-are-there-in-system-management.en.txt (3.9 KB)
    • 04_what-roles-are-there-in-system-management.mp4 (27.8 MB)
    • 05_what-is-going-to-prepare-me-for-practical-system-management.en.srt (8.1 KB)
    • 05_what-is-going-to-prepare-me-for-practical-system-management.en.txt (5.0 KB)
    • 05_what-is-going-to-prepare-me-for-practical-system-management.mp4 (35.4 MB)
    02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking 01_an-introduction-to-networking
    • 01_why-do-we-need-to-learn-networking.en.srt (9.6 KB)
    • 01_why-do-we-need-to-learn-networking.en.txt (5.8 KB)
    • 01_why-do-we-need-to-learn-networking.mp4 (46.4 MB)
    • 05_osi-model.en.srt (8.6 KB)
    • 05_osi-model.en.txt (5.2 KB)
    • 05_osi-model.mp4 (36.7 MB)
    03_what-is-virtualization 01_fundamentals-of-virtualization
    • 01_what-is-virtualization.en.srt (7.3 KB)
    • 01_what-is-virtualization.en.txt (4.5 KB)
    • 01_what-is-virtualization.mp4 (37.9 MB)
    • 02_types-of-virtualization.en.srt (8.9 KB)
    • 02_types-of-virtualization.en.txt (5.6 KB)
    • 02_types-of-virtualization.mp4 (38.4 MB)
    • 03_when-to-use-and-not-use-virtualization.en.srt (7.1 KB)
    • 03_when-to-use-and-not-use-virtualization.en.txt (4.2 KB)
    • 03_when-to-use-and-not-use-virtualization.mp4 (33.4 MB)
    • 04_your-computer-vs-an-enterprise-system.en.srt (7.9 KB)
    • 04_your-computer-vs-an-enterprise-system.en.txt (5.1 KB)
    • 04_your-computer-vs-an-enterprise-system.mp4 (33.8 MB)
    04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing 01_security
    • 01_why-information-security-in-the-first-place.en.srt (7.5 KB)
    • 01_why-information-security-in-the-first-place.en.txt (4.7 KB)
    • 01_why-information-security-in-the-first-place.mp4 (31.8 MB)
    • 03_what-is-a-secure-computer.en.srt (5.2 KB)
    • 03_what-is-a-secure-computer.en.txt (3.2 KB)
    • 03_what-is-a-secure-computer.mp4 (22.1 MB)
    • 04_risk-in-system-management.en.srt (12.8 KB)
    • 04_risk-in-system-management.en.txt (7.7 KB)
    • 04_risk-in-system-management.mp4 (53.7 MB)
    • 05_confidentiality-integrity-and-availability.en.srt (9.7 KB)
    • 05_confidentiality-integrity-and-availability.en.txt (5.9 KB)
    • 05_confidentiality-integrity-and-availability.mp4 (46.5 MB)
    linux-server-management-security 0. Websites you may like
    • [CourserHub.com].url (0.1 KB)
    01_introduction-to-practical-linux-system-management 01_welcome
    • 01_introduction.en.srt (5.6 KB)
    • 01_introduction.en.txt (3.4 KB)
    • 01_introduction.mp4 (22.0 MB)
    • 04_about-the-instructor.en.srt (10.6 KB)
    • 04_about-the-instructor.en.txt (6.2 KB)
    • 04_about-the-instructor.mp4 (155.3 MB)
    02_about-linux
    • 01_linux-in-the-enterprise.en.srt (10.3 KB)
    • 01_linux-in-the-enterprise.en.txt (6.3 KB)
    • 01_linux-in-the-enterprise.mp4 (44.0 MB)
    • 02_about-linux-and-distributions.en.srt (10.8 KB)
    • 02_about-linux-and-distributions.en.txt (6.3 KB)
    • 02_about-linux-and-distributions.mp4 (46.8 MB)
    02_configuring-linux-in-the-enterprise 01_configuring-linux-in-the-enterprise
    • 01_enterprise-install-of-centos.en.srt (4.9 KB)
    • 01_enterprise-install-of-centos.en.txt (3.1 KB)
    • 01_enterprise-install-of-centos.mp4 (8.5 MB)
    • 03_networking-in-linux.en.srt (7.3 KB)
    • 03_networking-in-linux.en.txt (4.3 KB)
    • 03_networking-in-linux.mp4 (11.3 MB)
    • 05_sudo.en.srt (6.9 KB)
    • 05_sudo.en.txt (4.1 KB)
    • 05_sudo.mp4 (13.4 MB)
    • 06_ssh.en.srt (12.9 KB)
    • 06_ssh.en.txt (7.4 KB)
    • 06_ssh.mp4 (24.6 MB)
    • 08_cron.en.srt (5.5 KB)
    • 08_cron.en.txt (3.3 KB)
    • 08_cron.mp4 (7.2 MB)
    03_users-authentication-and-authorization-in-a-linux-environment 01_users-authentication-and-authorization-in-a-linux-environment
    • 01_adding-users.en.srt (5.4 KB)
    • 01_adding-users.en.txt (3.2 KB)
    • 01_adding-users.mp4 (7.9 MB)
    • 03_securing-users.en.srt (8.2 KB)
    • 03_securing-users.en.txt (4.7 KB)
    • 03_securing-users.mp4 (14.7 MB)
    • 05_access-control.en.srt (9.0 KB)
    • 05_access-control.en.txt (5.4 KB)
    • 05_access-control.mp4 (13.6 MB)
    • 06_working-with-other-systems.en.srt (10.2 KB)
    • 06_working-with-other-systems.en.txt (6.1 KB)
    • Code:

      • udp://tracker.leechers-paradise.org:6969/announce
      • udp://tracker.coppersurfer.tk:6969/announce
      • udp://tracker.opentrackr.org:1337/announce
      • udp://tracker.zer0day.to:1337/announce
      • udp://eddie4.nl:6969/announce
      • udp://tracker.tiny-vps.com:6969/announce
      • udp://fasttracker.foreverpirates.co:6969/announce
      • udp://tracker.opentrackr.org:1337/announce
      • udp://explodie.org:6969/announce
      • udp://open.stealth.si:80/announce
      • udp://tracker.cyberia.is:6969/announce
      • udp://ipv4.tracker.harry.lu:80/announce
      • udp://tracker.uw0.xyz:6969/announce
      • udp://tracker.dler.org:6969/announce
      • udp://9.rarbg.to:2710/announce
      • udp://tracker.bitsearch.to:1337/announce
      • udp://tracker.altrosky.nl:6969/announce
      • udp://ben.kerbertools.xyz:6969/announce
      • udp://transkaroo.joustasie.net:6969/announce
      • udp://aarsen.me:6969/announce