File | Size |
---|
0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url | 328.00 B |
0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url | 286.00 B |
0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url | 163.00 B |
0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url | 239.00 B |
0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url | 294.00 B |
0. Websites you may like/How you can help Team-FTU.txt | 237.00 B |
01.Introduction/01.01.Find weaknesses in the perimeter.mp4 | 18.80 MB |
01.Introduction/01.01.Find weaknesses in the perimeter.srt | 2.71 kB |
01.Introduction/01.02.What you should know.mp4 | 1.95 MB |
01.Introduction/01.02.What you should know.srt | 1.33 kB |
01.Introduction/01.03.Course disclaimer.mp4 | 2.15 MB |
01.Introduction/01.03.Course disclaimer.srt | 2.30 kB |
02.Firewalls/02.04.Understanding Firewalls.mp4 | 1.83 MB |
02.Firewalls/02.04.Understanding Firewalls.srt | 2.05 kB |
02.Firewalls/02.05.Apply the basics of the Windows firewall.mp4 | 13.02 MB |
02.Firewalls/02.05.Apply the basics of the Windows firewall.srt | 7.09 kB |
02.Firewalls/02.06.Use advanced features in the Windows Firewall.mp4 | 23.44 MB |
02.Firewalls/02.06.Use advanced features in the Windows Firewall.srt | 11.11 kB |
02.Firewalls/02.07.Review firewall logs.mp4 | 10.01 MB |
02.Firewalls/02.07.Review firewall logs.srt | 5.81 kB |
02.Firewalls/02.08.Understand Linux IPTables.mp4 | 11.32 MB |
02.Firewalls/02.08.Understand Linux IPTables.srt | 5.78 kB |
02.Firewalls/02.09.Set up an IPTables firewall.mp4 | 7.43 MB |
02.Firewalls/02.09.Set up an IPTables firewall.srt | 3.39 kB |
02.Firewalls/02.10.Manage rules with Firewall Builder.mp4 | 19.82 MB |
02.Firewalls/02.10.Manage rules with Firewall Builder.srt | 11.95 kB |
02.Firewalls/02.11.Port testing.mp4 | 2.00 MB |
02.Firewalls/02.11.Port testing.srt | 1.68 kB |
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.mp4 | 8.44 MB |
03.Hardware Firewalls/03.12.Set up a Cisco PIX firewall.srt | 5.14 kB |
03.Hardware Firewalls/03.13.Create a secure enclave.mp4 | 8.60 MB |
03.Hardware Firewalls/03.13.Create a secure enclave.srt | 5.29 kB |
04.Network Simulation Using GNS3/04.14.Install GNS3.mp4 | 13.68 MB |
04.Network Simulation Using GNS3/04.14.Install GNS3.srt | 9.63 kB |
04.Network Simulation Using GNS3/04.15.Obtain network device images.mp4 | 5.89 MB |
04.Network Simulation Using GNS3/04.15.Obtain network device images.srt | 3.88 kB |
04.Network Simulation Using GNS3/04.16.Set up a network.mp4 | 13.07 MB |
04.Network Simulation Using GNS3/04.16.Set up a network.srt | 5.65 kB |
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.mp4 | 18.41 MB |
04.Network Simulation Using GNS3/04.17.Simulate the ASA firewall.srt | 8.50 kB |
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.mp4 | 13.54 MB |
04.Network Simulation Using GNS3/04.18.Integrate Kali into GNS3.srt | 6.10 kB |
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.mp4 | 10.76 MB |
05.Purpose Perimeter Devices/05.19.Understand Web Application Firewalls.srt | 6.48 kB |
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.mp4 | 29.16 MB |
05.Purpose Perimeter Devices/05.20.Protect API services with the WSO2 gateway.srt | 13.08 kB |
05.Purpose Perimeter Devices/05.21.Understand honeypots.mp4 | 11.53 MB |
05.Purpose Perimeter Devices/05.21.Understand honeypots.srt | 7.57 kB |
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.mp4 | 8.91 MB |
05.Purpose Perimeter Devices/05.22.Run the Cowrie honeypot.srt | 2.62 kB |
06.Protection from Intrusion/06.23.Intrusion response techniques.mp4 | 8.82 MB |
06.Protection from Intrusion/06.23.Intrusion response techniques.srt | 8.18 kB |
06.Protection from Intrusion/06.24.xListing sites.mp4 | 1.84 MB |
06.Protection from Intrusion/06.24.xListing sites.srt | 1.78 kB |
06.Protection from Intrusion/06.25.Snort rules.mp4 | 14.18 MB |
06.Protection from Intrusion/06.25.Snort rules.srt | 7.87 kB |
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.mp4 | 16.88 MB |
06.Protection from Intrusion/06.26.Detect intrusions with Security Onion.srt | 7.01 kB |
06.Protection from Intrusion/06.27.Extend IDS with reputation.mp4 | 5.98 MB |
06.Protection from Intrusion/06.27.Extend IDS with reputation.srt | 4.36 kB |
06.Protection from Intrusion/06.28.EINSTEIN.mp4 | 8.80 MB |
06.Protection from Intrusion/06.28.EINSTEIN.srt | 4.11 kB |
07.Conclusion/07.29.Next steps.mp4 | 7.25 MB |
07.Conclusion/07.29.Next steps.srt | 1.98 kB |
Exercise Files.zip | 333.99 kB |