Lynda - Protecting Your Network with Open-Source Software
- Type:
- Other > Other
- Files:
- 46
- Size:
- 301.29 MiB (315922846 Bytes)
- Uploaded:
- 2017-07-16 04:43:14 GMT
- By:
- sumi
- Seeders:
- 2
- Leechers:
- 0
- Comments
- 0
- Info Hash: B5DEBAC0A3CC683D353450915B1B6004F0423A8E
(Problems with magnets links are fixed by upgrading your torrent client!)
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network. Topics include: Setting up a host firewall Setting up a host as a network firewall Setting up a DMZ Capturing and analyzing packets with Wireshark Using Snort to detect network intrusions Logging network activity with syslog-ng, Kiwi, and other solutions Setting up a simple network management protocol (SNMP)
00. Introduction/00_01 - Welcome.mp4 | 12.15 MiB |
00. Introduction/00_02 - What you should know before watching this course.mp4 | 3.11 MiB |
01. Understanding Firewalls/01_01 - What is a firewall.mp4 | 6.04 MiB |
01. Understanding Firewalls/01_02 - A host firewall.mp4 | 7.63 MiB |
01. Understanding Firewalls/01_03 - A network firewall.mp4 | 6.41 MiB |
01. Understanding Firewalls/01_04 - Static packet filtering (SPF) vs. stateful packet inspection (SPI).mp4 | 5.2 MiB |
02. Host as a Router/02_01 - Netfilter and iptables.mp4 | 5.76 MiB |
02. Host as a Router/02_02 - Using iptables to set up a host firewall.mp4 | 15.55 MiB |
02. Host as a Router/02_03 - Creating a shell script to automate configuring Netfilter.mp4 | 12.43 MiB |
02. Host as a Router/02_04 - Understanding hosts as routers.mp4 | 4.66 MiB |
02. Host as a Router/02_05 - Host as a router Including an additional network adapter.mp4 | 11.14 MiB |
02. Host as a Router/02_06 - Host as a router Setting up a second host to test the router.mp4 | 7.76 MiB |
02. Host as a Router/02_07 - Host as a router Setting up IP forwarding.mp4 | 6.69 MiB |
02. Host as a Router/02_08 - Host as a router Configuring the router's Netfilter settings.mp4 | 10.76 MiB |
02. Host as a Router/02_09 - Host as a router Testing.mp4 | 4.28 MiB |
03. Host as a Firewall/03_01 - Understanding using a host as a network firewall.mp4 | 5.6 MiB |
03. Host as a Firewall/03_02 - Setting up a web server to receive forwarded packets.mp4 | 3 MiB |
03. Host as a Firewall/03_03 - Configuring port forwarding by adding Netfilter rules.mp4 | 9.37 MiB |
03. Host as a Firewall/03_04 - Testing port forwarding.mp4 | 3.29 MiB |
03. Host as a Firewall/03_05 - Understanding one-legged demilitarized zones (DMZs) using iptables.mp4 | 5.36 MiB |
03. Host as a Firewall/03_06 - Using iptables to set up a one-legged DMZ.mp4 | 6.15 MiB |
03. Host as a Firewall/03_07 - Using iptables to set up a true DMZ.mp4 | 2.97 MiB |
03. Host as a Firewall/03_08 - Understanding Squid, an application proxy firewall.mp4 | 5.35 MiB |
03. Host as a Firewall/03_09 - Setting up Squid.mp4 | 9.9 MiB |
03. Host as a Firewall/03_10 - Fine-tuning the Ubuntu router host.mp4 | 13.1 MiB |
04. Packet Analysis/04_01 - What is a packet analysis.mp4 | 5.02 MiB |
04. Packet Analysis/04_02 - Packet-analysis applications in network security ARP poisoning example.mp4 | 9.31 MiB |
04. Packet Analysis/04_03 - Packet capturing with Wireshark.mp4 | 9.61 MiB |
04. Packet Analysis/04_04 - Exploring Wireshark's advanced features.mp4 | 2.92 MiB |
04. Packet Analysis/04_05 - Demonstrating Wireshark's advanced features.mp4 | 11.09 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_01 - What is an IDS.mp4 | 5.37 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_02 - Introducing Snort.mp4 | 4.05 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_03 - Snort as a packet sniffer.mp4 | 8.42 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_04 - Snort as an IDS Establishing rules.mp4 | 7.72 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_05 - Snort as an IDS Detecting pings.mp4 | 6.76 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_06 - What is network vulnerability assessment.mp4 | 6.8 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_07 - Nessus.mp4 | 3.37 MiB |
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_08 - Network scanning with Nessus.mp4 | 3.85 MiB |
06. Logging and Monitoring/06_01 - Logging and its significance.mp4 | 3.06 MiB |
06. Logging and Monitoring/06_02 - Syslog-ng.mp4 | 2.06 MiB |
06. Logging and Monitoring/06_03 - Log forwarding using syslog-ng Part one.mp4 | 6.51 MiB |
06. Logging and Monitoring/06_04 - Log forwarding using syslog-ng Part two.mp4 | 10.81 MiB |
06. Logging and Monitoring/06_05 - Kiwi.mp4 | 4.39 MiB |
06. Logging and Monitoring/06_06 - Simple Network Management Protocol (SNMP).mp4 | 4.33 MiB |
06. Logging and Monitoring/07_01 - Next steps.mp4 | 2.18 MiB |
Torrent Downloaded From Katcr.co - Kickasstorrents.txt | 52 B |