4.Exploring the Local System Security/17.Exploring Permissions.mp4 88.8 MB
4.Exploring the Local System Security/15.Securing the Boot Process.mp4 87.43 MB
3.Securing the Kernel and Services/13.Hands-on Example – Postfix.mp4 86.89 MB
6.Verifying the Security Setup/23.Running a Security Scanner.mp4 84.21 MB
1.How Hackers Work/04.Passwords.mp4 79.14 MB
5.Secure Management/19.Secure Logging and Monitoring.mp4 73.88 MB
3.Securing the Kernel and Services/11.Disabling Unnecessary Services.mp4 68.55 MB
1.How Hackers Work/01.The Course Overview.mp4 68.18 MB
2.Critical Tasks First/09.Configuring Firewalling.mp4 67.38 MB
3.Securing the Kernel and Services/14.Hands-on Example – Apache.mp4 66.52 MB
3.Securing the Kernel and Services/10.Configuring the Kernel Against Remote Attacks.mp4 63.51 MB
1.How Hackers Work/06.Identify Your Attack Surface.mp4 63.42 MB
4.Exploring the Local System Security/16.Using the SUID_SGID.mp4 52.35 MB
5.Secure Management/18.Secure Remote Access.mp4 48.39 MB
6.Verifying the Security Setup/22.Running a Port Scanner.mp4 45.35 MB
1.How Hackers Work/05.Attacks on Administrator Workstations.mp4 34.99 MB
6.Verifying the Security Setup/24.Outlook and Closure.mp4 32.17 MB
5.Secure Management/20.Secure Backups.mp4 29.55 MB
5.Secure Management/21.Configuring Important Security Software.mp4 28.72 MB
2.Critical Tasks First/07.Configuring Automated Security Updates.mp4 21.21 MB
2.Critical Tasks First/08.Implementing Password Security.mp4 15.06 MB
3.Securing the Kernel and Services/12.Securely Configuring Services.mp4 11.4 MB
1.How Hackers Work/03.Insecure Software.mp4 11.28 MB
1.How Hackers Work/02.Port Scanning.mp4 6.15 MB
Katz.sx - Your Search Engine For Warez!.url 104 B
Download Info
Tips
“Packt - Mastering Linux Security” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.