Lynda - Protecting Your Network with Open Source Software

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 473.6 MB
  • Uploaded By tutsnode
  • Downloads 1364
  • Last checked 18 hours ago
  • Date uploaded 4 years ago
  • Seeders 41
  • Leechers 0

Infohash : 3E50294EDBF891F98C9CB7559C7C15167744DC28




Description

Network protection is vital to organizations big and small, but it doesn’t have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network.

Released 4/1/2021

Files:

Protecting Your Network with Open Source Software [TutsNode.com] - Protecting Your Network with Open Source Software 08 - Logging and Monitoring
  • 04 - Log forwarding Part 2.mp4 (19.8 MB)
  • 04 - Log forwarding Part 2.srt (4.9 KB)
  • 03 - Log forwarding Part 1.srt (3.2 KB)
  • 06 - SNMP.srt (3.0 KB)
  • 02 - Syslog-ng.srt (2.6 KB)
  • 01 - Logging.srt (1.7 KB)
  • 05 - Kiwi.srt (1.3 KB)
  • 02 - Syslog-ng.mp4 (10.5 MB)
  • 06 - SNMP.mp4 (7.8 MB)
  • 03 - Log forwarding Part 1.mp4 (7.7 MB)
  • 01 - Logging.mp4 (6.1 MB)
  • 05 - Kiwi.mp4 (6.0 MB)
04 - Hosts as a Router
  • 02 - Setting up a host firewall using iptables.srt (5.8 KB)
  • 08 - Changing Netfilter settings.srt (5.4 KB)
  • 03 - Automating Netfilter configuration.srt (4.4 KB)
  • 07 - Setting up IP forwarding.srt (3.8 KB)
  • 05 - Adding a network adapter.srt (3.6 KB)
  • 01 - Netfilter and iptables.srt (3.3 KB)
  • 06 - Testing the second adapter.srt (2.1 KB)
  • 04 - Understanding hosts as routers.srt (3.1 KB)
  • 09 - Testing the router.srt (1.5 KB)
  • 08 - Changing Netfilter settings.mp4 (14.1 MB)
  • 02 - Setting up a host firewall using iptables.mp4 (12.9 MB)
  • 05 - Adding a network adapter.mp4 (12.5 MB)
  • 03 - Automating Netfilter configuration.mp4 (10.5 MB)
  • 01 - Netfilter and iptables.mp4 (9.2 MB)
  • 07 - Setting up IP forwarding.mp4 (7.8 MB)
  • 04 - Understanding hosts as routers.mp4 (7.0 MB)
  • 06 - Testing the second adapter.mp4 (6.9 MB)
  • 09 - Testing the router.mp4 (3.8 MB)
01 - Introduction
  • 01 - Protect your network with free software.srt (1.5 KB)
  • 02 - What you should know.srt (1.6 KB)
  • 03 - Set up environment.srt (3.5 KB)
  • 03 - Set up environment.mp4 (11.2 MB)
  • 01 - Protect your network with free software.mp4 (6.8 MB)
  • 02 - What you should know.mp4 (2.3 MB)
06 - Packet Analysis
  • 02 - ARP poisoning example.srt (5.2 KB)
  • 04 - Exploring Wireshark advanced features.srt (3.8 KB)
  • 03 - Packet capturing with Wireshark.srt (3.7 KB)
  • 05 - Wireshark hands-on.srt (3.6 KB)
  • 01 - What is packet analysis.srt (3.4 KB)
  • 05 - Wireshark hands-on.mp4 (14.6 MB)
  • 03 - Packet capturing with Wireshark.mp4 (14.4 MB)
  • 01 - What is packet analysis.mp4 (12.3 MB)
  • 04 - Exploring Wireshark advanced features.mp4 (10.7 MB)
  • 02 - ARP poisoning example.mp4 (10.0 MB)
07 - Intrusion Detection Systems (IDS) and Vulnerability Assessment
  • 04 - Snort as an IDS Establishing rules.srt (4.7 KB)
  • 03 - Snort as a packet sniffer.srt (4.1 KB)
  • 06 - What is a network vulnerability assessment.srt (4.0 KB)
  • 01 - What is an IDS.srt (3.9 KB)
  • 02 - Introducing Snort.srt (3.3 KB)
  • 07 - Nessus.srt (2.8 KB)
  • 05 - Snort as an IDS Detecting pings.srt (2.6 KB)
  • 08 - Network scanning with Nessus.srt (2.3 KB)
  • 03 - Snort as a packet sniffer.mp4 (14.2 MB)
  • 06 - What is a network vulnerability assessment.mp4 (11.3 MB)
  • 01 - What is an IDS.mp4 (11.0 MB)
  • 04 - Snort as an IDS Establishing rules.mp4 (10.6 MB)
  • 02 - Introducing Snort.mp4 (9.9 MB)
  • 07 - Nessus.mp4 (9.4 MB)
  • 08 - Network scanning with Nessus.mp4 (6.2 MB)
  • 05 - Snort as an IDS Detecting pings.mp4 (4.7 MB)
05 - Hosts as a Firewall
  • 08 - Setting up Squid.srt (4.3 KB)
  • 07 - Understanding an application proxy firewall.srt (4.3 KB)
  • 03 - Port forwarding.srt (3.8 KB)
  • 05 - Understanding one-legged DMZ.srt (3.8 KB)
  • 02 - Setting up a web server.srt (3.7 KB)
  • 01 - Setting up hosts as a network firewall.srt (3.6 KB)
  • 06 - Understanding true DMZ.srt (1.9 KB)
  • 04 - Testing port forwarding.srt (0.6 KB)
  • 08 - Setting up Squid.mp4 (15.2 MB)
  • 07 - Understanding an application proxy firewall.mp4 (13.1 MB)
  • 03 - Port forwarding.mp4 (13.0 MB)
  • 02 - Setting up a web server.mp4 (11.2 MB)
  • 01 - Setting up hosts as a network firewall.mp4 (9.1 MB)
  • 05 - Understanding one-legged DMZ.mp4 (7.4 MB)
  • 06 - Understanding true DMZ.mp4 (4.1 MB)
  • 04 - Testing port forwarding.mp4 (1.3 MB)
03 - Firewalls
  • 01 - What is a firewall.srt (4.1 KB)
  • 02 - Host firewalls.srt (4.0 KB)
  • 03 - Network firewalls.srt (3.6 KB)
  • 04 - Static packet filtering vs. stateful packet inspection.srt (2.9 KB)
  • 01 - What is a firewall.mp4 (10.5 MB)
  • 03 - Network firewalls.mp4 (10.1 MB)
  • 02 - Host firewalls.mp4 (8.8 MB)
  • 04 - Static packet filtering vs. stateful packet inspection.mp4 (5.4 MB)
02 - Understanding Open-Source Software
  • 03 - Open-source solutions in cybersecurity.srt (3.6 KB)
  • 05 - Costs and savings.srt (3.4 KB)
  • 02 - Open-source software in networking.srt (3.4 KB)
  • 01 - What is open-source software.srt (3.3 KB)
  • 04 - Open-source vs. commercial software.srt (3.3 KB)
  • 02 - Open-source software in networking.mp4 (12.5 MB)
  • 01 - What is open-source software.mp4 (11.4 MB)
  • 04 - Open-source vs. commercial software.mp4 (11.2 MB)
  • 03 - Open-source solutions in cybersecurity.mp4 (10.8 MB)
  • 05 - Costs and savings.mp4 (8.4 MB)
09 - Conclusion
  • 01 - Next steps and additional resources.srt (0.9 KB)
  • 01 - Next steps and additional resources.mp4 (1.6 MB)
  • TutsNode.com.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
  • .pad
    • 0 (8.8 KB)
    • 1 (35.7 KB)
    • 2 (173.0 KB)
    • 3 (71.7 KB)
    • 4 (63.3 KB)
    • 5 (147.7 KB)
    • 6 (183.0 KB)
    • 7 (252.3 KB)
    • 8 (89.2 KB)
    • 9 (211.3 KB)
    • 10 (40.7 KB)
    • 11 (206.5 KB)
    • 12 (73.5 KB)
    • 13 (180.6 KB)
    • 14 (50.5 KB)
    • 15 (88.2 KB)
    • 16 (88.9 KB)
    • 17 (18.5 KB)
    • 18 (230.9 KB)
    • 19 (89.3 KB)
    • 20 (138.1 KB)
    • 21 (233.5 KB)
    • 22 (240.5 KB)
    • 23 (26.3 KB)
    • 24 (149.3 KB)
    • 25 (11.0 KB)
    • 26 (106.8 KB)
    • 27 (52.9 KB)
    • 28 (39.1 KB)
    • 29 (203.8 KB)
    • 30 (256.0 KB)
    • 31 (144.8 KB)
    • 32 (168.7 KB)
    • 33 (205.8 KB)
    • 34 (56.2 KB)
    • 35 (60.3 KB)
    • 36 (237.3 KB)
    • 37 (150.3 KB)
    • 38 (180.7 KB)
    • 39 (64.0 KB)
    • 40 (152.2 KB)
    • 41 (255.8 KB)
    • 42 (151.5 KB)
    • 43 (13.5 KB)
    • 44 (119.0 KB)
    • 45 (201.7 KB)
    • 46 (184.8 KB)
    • 47 (140.0 KB)

Comments

Code:

  • udp://inferno.demonoid.pw:3391/announce
  • udp://tracker.openbittorrent.com:80/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://torrent.gresille.org:80/announce
  • udp://glotorrents.pw:6969/announce
  • udp://tracker.leechers-paradise.org:6969/announce
  • udp://tracker.pirateparty.gr:6969/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://9.rarbg.to:2710/announce
  • udp://shadowshq.yi.org:6969/announce
  • udp://tracker.zer0day.to:1337/announce
REVERSE-PROXY πŸ”„ RP (success) | 1281ms πŸ“„ torrent πŸ• 16 Jan 2026, 11:59:53 am IST ⏰ 10 Feb 2026, 11:59:53 am IST βœ… Valid for 24d 23h πŸ”„ Wait 10m