[ FreeCourseWeb.com ] Udemy - Industrial Network Security - Protecting Critical Systems

mp4   Hot:4   Size:3.07 GB   Created:2025-05-26 19:25:19   Update:2025-05-27 05:07:50  

File List

  • Get Bonus Downloads Here.url 183 B
    ~Get Your Files Here !/1 - Introduction to Network Security Context/1 -Course Introduction and Cyber Security Relevance.mp4 143.28 MB
    ~Get Your Files Here !/1 - Introduction to Network Security Context/2 -Standard Industrial Network Technology.mp4 165.9 MB
    ~Get Your Files Here !/1 - Introduction to Network Security Context/3 -The OSI 7-Layer Reference Model.mp4 182.85 MB
    ~Get Your Files Here !/2 - Physical and Data Link Layers - Foundations for Security/1 -Physical Layer.mp4 82.12 MB
    ~Get Your Files Here !/2 - Physical and Data Link Layers - Foundations for Security/2 -OSI Layer 1 – Deep Dive.mp4 83.68 MB
    ~Get Your Files Here !/2 - Physical and Data Link Layers - Foundations for Security/3 -Data Link Layer.mp4 77.19 MB
    ~Get Your Files Here !/2 - Physical and Data Link Layers - Foundations for Security/4 -OSI Layer 2 – Deep Dive.mp4 71.26 MB
    ~Get Your Files Here !/2 - Physical and Data Link Layers - Foundations for Security/5 -Switching Routing Fundamentals.mp4 104.76 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/1 -Network Layer.mp4 108.86 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/2 -OSI Layer 3 – Deep Dive.mp4 66.01 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/3 -IP Security (IPsec).mp4 106.62 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/4 -Network Address Translation (NAT) and Firewalls.mp4 96.47 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/5 -Network Segmentation (Advanced).mp4 125.48 MB
    ~Get Your Files Here !/3 - Network Layer - Routing and IP Security/6 -Network Segmentation – Deep Dive.mp4 124.08 MB
    ~Get Your Files Here !/4 - Transport and Application Layers - Security in Communication/1 -Transport Layer.mp4 95.91 MB
    ~Get Your Files Here !/4 - Transport and Application Layers - Security in Communication/2 -Application Layer.mp4 141.24 MB
    ~Get Your Files Here !/4 - Transport and Application Layers - Security in Communication/3 -DNS Security.mp4 134.53 MB
    ~Get Your Files Here !/4 - Transport and Application Layers - Security in Communication/4 -Managed vs. Unmanaged Networks (Security Perspective).mp4 131.18 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/1 -Traffic Prioritization (Quality of Service - QoS).mp4 102.97 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/2 -Traffic Prioritization - Quality of Service (QoS) Deep Dive.mp4 65.2 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/3 -Network Monitoring and Logging.mp4 144.23 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/4 -Network Security Tools.mp4 144.32 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/5 -Network Security Best Practices and Hardening.mp4 129.5 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/6 -Scalable Time Distribution.mp4 89.52 MB
    ~Get Your Files Here !/5 - Network Optimization and Security Tools/7 -Precision Time Protocol (PTP) - IEEE 1588.mp4 92.42 MB
    ~Get Your Files Here !/6 - Cryptography and Network Security/1 -Symmetric and Asymmetric Cryptography.mp4 98.93 MB
    ~Get Your Files Here !/6 - Cryptography and Network Security/2 -Hashing and Digital Signatures.mp4 97.42 MB
    ~Get Your Files Here !/6 - Cryptography and Network Security/3 -Key Management and Cryptographic Protocols.mp4 141.51 MB
    ~Get Your Files Here !/Bonus Resources.txt 70 B

Download Info

  • Tips

    “[ FreeCourseWeb.com ] Udemy - Industrial Network Security - Protecting Critical Systems” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.