PuZo.org: Coursera - Network Security & Database Vulnerabilities - PuZo.org

Jump to content

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

Coursera - Network Security & Database Vulnerabilities

#1 User is offline   TechBladder 

  • Addicted to PuZo's
  • PipPipPipPipPip
  • Group: Members
  • Posts: 95146
  • Joined: 18-April 20

Posted 17 April 2024 - 09:37 PM

Posted Image

Download Free Download : Coursera - Network Security & Database Vulnerabilities
mp4 | Video: h264,1280X720 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:459.95 MB

Files Included :

01 welcome-to-the-course-network-security-database-vulnerabilities.mp4 (7.44 MB)
MP4
04 welcome-to-introduction-to-tcp-ip-framework.mp4 (3.13 MB)
MP4
05 stateless-inspection.mp4 (5.83 MB)
MP4
06 stateful-inspection.mp4 (5.71 MB)
MP4
07 firewall-filters-ids-and-ips-systems.mp4 (6.83 MB)
MP4
08 the-difference-between-ids-and-ips-systems.mp4 (2.96 MB)
MP4
09 network-address-translation.mp4 (6.11 MB)
MP4
01 an-introduction-to-local-area-networks.mp4 (10.3 MB)
MP4
02 ethernet-and-lan-ethernet-operations.mp4 (6.93 MB)
MP4
03 ethernet-and-lan-network-devices.mp4 (6.54 MB)
MP4
01 introduction-to-basic-network-routing.mp4 (1.08 MB)
MP4
02 layer-2-and-layer-3-network-addressing.mp4 (9.23 MB)
MP4
03 address-resolution-protocol.mp4 (12.68 MB)
MP4
04 routers-and-routing-tables-part-1.mp4 (4.1 MB)
MP4
05 routers-and-routing-tables-part-2.mp4 (2.84 MB)
MP4
06 routers-and-routing-tables-part-3.mp4 (12.53 MB)
MP4
01 welcome-to-the-basics-of-ip-addressing-and-the-osi-model.mp4 (3.27 MB)
MP4
02 ip-addressing-the-basics-of-binary.mp4 (11.7 MB)
MP4
03 ip-address-structure-and-network-classes.mp4 (7.05 MB)
MP4
04 ip-protocol-and-traffic-routing.mp4 (10.7 MB)
MP4
05 introduction-to-the-ipv6-address-schema.mp4 (6.91 MB)
MP4
01 application-and-transport-protocols-udp-and-tcp-part-1.mp4 (6.49 MB)
MP4
02 application-and-transport-protocols-udp-and-tcp-part-2.mp4 (14.05 MB)
MP4
01 using-your-windows-lab-workspace.mp4 (8.67 MB)
MP4
02 dns-and-dhcp.mp4 (7.56 MB)
MP4
03 syslog-message-logging-protocol.mp4 (6.6 MB)
MP4
04 flows-and-network-analysis.mp4 (2.81 MB)
MP4
05 port-mirroring-and-promiscuous-mode.mp4 (3.9 MB)
MP4
01 next-generation-firewalls-overview.mp4 (5.33 MB)
MP4
02 ngfw-and-the-osi-model.mp4 (3.62 MB)
MP4
03 ngfw-packet-flow-example-and-ngfw-comparisons.mp4 (9.82 MB)
MP4
04 intrusion-detection-and-intrusion-prevention-systems.mp4 (7.08 MB)
MP4
01 high-availability-and-clustering.mp4 (13.55 MB)
MP4
01 welcome-to-introduction-to-databases.mp4 (6.98 MB)
MP4
02 data-source-types-part-1.mp4 (6.6 MB)
MP4
03 data-source-types-part-2.mp4 (9.2 MB)
MP4
04 data-model-types.mp4 (8.24 MB)
MP4
05 structured-data.mp4 (12.81 MB)
MP4
01 securing-the-crown-jewels.mp4 (14.61 MB)
MP4
02 leveraging-security-industry-best-practices.mp4 (1.91 MB)
MP4
03 structured-data-and-relational-databases.mp4 (2.86 MB)
MP4
04 anatomy-of-a-vulnerability-assessment-test-report.mp4 (4.94 MB)
MP4
05 securing-data-sources-by-type.mp4 (12.67 MB)
MP4
06 securing-databases-wrap-up.mp4 (3.52 MB)
MP4
01 data-monitoring.mp4 (11.49 MB)
MP4
02 data-alerts.mp4 (8.97 MB)
MP4
03 data-activity-reporting.mp4 (16.79 MB)
MP4
04 attributes-to-include-in-logging.mp4 (10.8 MB)
MP4
05 failed-access-monitoring.mp4 (4.63 MB)
MP4
06 suspicious-access-events-part-1.mp4 (9.9 MB)
MP4
07 suspicious-access-events-part-2.mp4 (13.35 MB)
MP4
01 welcome-to-deep-dive-injection-vulnerability.mp4 (1.75 MB)
MP4
02 introduction-to-injection-flaws.mp4 (5.3 MB)
MP4
03 os-command-injection-part-1.mp4 (12.78 MB)
MP4
04 os-command-injection-part-2.mp4 (7.91 MB)
MP4
05 os-command-injection-part-3.mp4 (11.29 MB)
MP4
01 sql-injection-part-1.mp4 (12.16 MB)
MP4
02 sql-injection-part-2.mp4 (8.61 MB)
MP4
01 other-types-of-injection.mp4 (6.57 MB)
MP4

Posted Image

 https://voltupload.com/y5ig4lc6d5qk/Coursera_-_Network_Security__Database_Vulnerabilities.zip


 https://rapidgator.net/file/10c3226a1a8e82c384e4004106aecdab/Coursera_-_Network_Security__Database_Vulnerabilities.zip



Free search engine download: Coursera - Network Security & Database Vulnerabilities

Share this topic:


Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic