Details for this torrent 

Lynda - Protecting Your Network with Open-Source Software
Type:
Other > Other
Files:
46
Size:
301.29 MiB (315922846 Bytes)
Uploaded:
2017-07-16 04:43:14 GMT
By:
sumi VIP
Seeders:
2
Leechers:
0
Comments
0  

Info Hash:
B5DEBAC0A3CC683D353450915B1B6004F0423A8E




(Problems with magnets links are fixed by upgrading your torrent client!)
Network protection is vital to organizations big and small, but it doesn't have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely FREE. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network.
Topics include:
Setting up a host firewall
Setting up a host as a network firewall
Setting up a DMZ
Capturing and analyzing packets with Wireshark
Using Snort to detect network intrusions
Logging network activity with syslog-ng, Kiwi, and other solutions
Setting up a simple network management protocol (SNMP)

00. Introduction/00_01 - Welcome.mp412.15 MiB
00. Introduction/00_02 - What you should know before watching this course.mp43.11 MiB
01. Understanding Firewalls/01_01 - What is a firewall.mp46.04 MiB
01. Understanding Firewalls/01_02 - A host firewall.mp47.63 MiB
01. Understanding Firewalls/01_03 - A network firewall.mp46.41 MiB
01. Understanding Firewalls/01_04 - Static packet filtering (SPF) vs. stateful packet inspection (SPI).mp45.2 MiB
02. Host as a Router/02_01 - Netfilter and iptables.mp45.76 MiB
02. Host as a Router/02_02 - Using iptables to set up a host firewall.mp415.55 MiB
02. Host as a Router/02_03 - Creating a shell script to automate configuring Netfilter.mp412.43 MiB
02. Host as a Router/02_04 - Understanding hosts as routers.mp44.66 MiB
02. Host as a Router/02_05 - Host as a router Including an additional network adapter.mp411.14 MiB
02. Host as a Router/02_06 - Host as a router Setting up a second host to test the router.mp47.76 MiB
02. Host as a Router/02_07 - Host as a router Setting up IP forwarding.mp46.69 MiB
02. Host as a Router/02_08 - Host as a router Configuring the router's Netfilter settings.mp410.76 MiB
02. Host as a Router/02_09 - Host as a router Testing.mp44.28 MiB
03. Host as a Firewall/03_01 - Understanding using a host as a network firewall.mp45.6 MiB
03. Host as a Firewall/03_02 - Setting up a web server to receive forwarded packets.mp43 MiB
03. Host as a Firewall/03_03 - Configuring port forwarding by adding Netfilter rules.mp49.37 MiB
03. Host as a Firewall/03_04 - Testing port forwarding.mp43.29 MiB
03. Host as a Firewall/03_05 - Understanding one-legged demilitarized zones (DMZs) using iptables.mp45.36 MiB
03. Host as a Firewall/03_06 - Using iptables to set up a one-legged DMZ.mp46.15 MiB
03. Host as a Firewall/03_07 - Using iptables to set up a true DMZ.mp42.97 MiB
03. Host as a Firewall/03_08 - Understanding Squid, an application proxy firewall.mp45.35 MiB
03. Host as a Firewall/03_09 - Setting up Squid.mp49.9 MiB
03. Host as a Firewall/03_10 - Fine-tuning the Ubuntu router host.mp413.1 MiB
04. Packet Analysis/04_01 - What is a packet analysis.mp45.02 MiB
04. Packet Analysis/04_02 - Packet-analysis applications in network security ARP poisoning example.mp49.31 MiB
04. Packet Analysis/04_03 - Packet capturing with Wireshark.mp49.61 MiB
04. Packet Analysis/04_04 - Exploring Wireshark's advanced features.mp42.92 MiB
04. Packet Analysis/04_05 - Demonstrating Wireshark's advanced features.mp411.09 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_01 - What is an IDS.mp45.37 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_02 - Introducing Snort.mp44.05 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_03 - Snort as a packet sniffer.mp48.42 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_04 - Snort as an IDS Establishing rules.mp47.72 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_05 - Snort as an IDS Detecting pings.mp46.76 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_06 - What is network vulnerability assessment.mp46.8 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_07 - Nessus.mp43.37 MiB
05. Intrusion Detection Systems (IDS) and Vulnerability Assessment/05_08 - Network scanning with Nessus.mp43.85 MiB
06. Logging and Monitoring/06_01 - Logging and its significance.mp43.06 MiB
06. Logging and Monitoring/06_02 - Syslog-ng.mp42.06 MiB
06. Logging and Monitoring/06_03 - Log forwarding using syslog-ng Part one.mp46.51 MiB
06. Logging and Monitoring/06_04 - Log forwarding using syslog-ng Part two.mp410.81 MiB
06. Logging and Monitoring/06_05 - Kiwi.mp44.39 MiB
06. Logging and Monitoring/06_06 - Simple Network Management Protocol (SNMP).mp44.33 MiB
06. Logging and Monitoring/07_01 - Next steps.mp42.18 MiB
Torrent Downloaded From Katcr.co - Kickasstorrents.txt52 B