MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 27m | Size: 435.3 MB
In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test.
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction