LinkedIn Learning IT Security Foundations Operating System Security\01.Introduction\01.01.Ensure system security.mp4
[7b8fb065715f854]
|
4,750,508 |
36545DCB |
LinkedIn Learning IT Security Foundations Operating System Security\01.Introduction\01.01.Ensure system security.srt |
1,604 |
3E4121DE |
LinkedIn Learning IT Security Foundations Operating System Security\01.Introduction\01.02.Prepare for MTA Exam 98-367.mp4
[e4ecc20504393e76]
|
2,520,405 |
9EC5F525 |
LinkedIn Learning IT Security Foundations Operating System Security\01.Introduction\01.02.Prepare for MTA Exam 98-367.srt |
1,396 |
03346895 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.03.Passwords and complexity.mp4
[8249b0dc11bf8fdb]
|
15,401,818 |
3BE0B043 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.03.Passwords and complexity.srt |
8,044 |
69AB2CD3 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.04.Smart cards and tokens.mp4
[4f94e1b0e6b57a1e]
|
7,606,012 |
C5187A95 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.04.Smart cards and tokens.srt |
4,514 |
012F681E |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.05.Biometric identification.mp4
[c5a95fdfcdb7bd5a]
|
13,730,818 |
45B6EF11 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.05.Biometric identification.srt |
7,280 |
65B97838 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.06.Multifactor authentication.mp4
[4bcdbe3643cbd8c8]
|
10,393,090 |
43325C58 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.06.Multifactor authentication.srt |
4,832 |
12768025 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.07.RADIUS.mp4
[b41463ad4249b172]
|
11,312,988 |
276B1FDF |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication\02.07.RADIUS.srt |
7,742 |
C2D7BF9B |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.08.NTFS file, share, registry.mp4
[7d7015483ed5137b]
|
12,387,842 |
90E57852 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.08.NTFS file, share, registry.srt |
7,055 |
3306C580 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.09.Permission behavior.mp4
[bebc8d012c9fea9b]
|
10,476,034 |
7E010A23 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.09.Permission behavior.srt |
6,202 |
012C94A3 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.10.NTFS demo.mp4
[5f45c5cf4f872639]
|
5,685,592 |
7265425D |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.10.NTFS demo.srt |
3,814 |
85B08D7F |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.11.Active Directory structure.mp4
[4090fdaaf5e3d1ef]
|
8,437,934 |
7E4DDDC9 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.11.Active Directory structure.srt |
4,851 |
54E66051 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.12.Active Directory components.mp4
[437fb4a903fddd34]
|
12,077,916 |
08E8AA0E |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.12.Active Directory components.srt |
6,795 |
4922B32D |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.13.Use Run As.mp4
[4da9575133519fd8]
|
5,962,412 |
F14EF7C3 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions\03.13.Use Run As.srt |
4,101 |
2262F5CB |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.14.Types and enabling auditing.mp4
[228f460ff36e3f06]
|
13,261,487 |
2BC488A8 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.14.Types and enabling auditing.srt |
7,058 |
9DF0F819 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.15.What to audit.mp4
[d2c4579d12f249e4]
|
8,732,332 |
09FFF2D0 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.15.What to audit.srt |
4,396 |
668529C7 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.16.Secure audit logs.mp4
[3eade642818c91de]
|
10,080,397 |
218ED097 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies\04.16.Secure audit logs.srt |
6,147 |
4DF16085 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.17.Isolate the server.mp4
[9bde07bb1fe319d]
|
9,991,681 |
2C34016C |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.17.Isolate the server.srt |
5,910 |
21363F73 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.18.Harden Updates and patching.mp4
[467f67660b713699]
|
9,017,007 |
AACEB371 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.18.Harden Updates and patching.srt |
5,065 |
AE3EF457 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.19.Protocol good practices.mp4
[98f16260d5ce9c56]
|
13,572,267 |
2DDB7F30 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection\05.19.Protocol good practices.srt |
5,451 |
C4BF3EF5 |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.20.Email clients and servers.mp4
[62b4c769f1f54050]
|
13,943,813 |
C695037D |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.20.Email clients and servers.srt |
7,842 |
87F2B8C4 |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.21.Email and SPAM.mp4
[da91e7f301852041]
|
10,483,206 |
4CBE98DB |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.21.Email and SPAM.srt |
5,713 |
A06FAF16 |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.22.PTR records.mp4
[83a9b789af88abcc]
|
5,586,092 |
1B869EC4 |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection\06.22.PTR records.srt |
3,137 |
5638D02A |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.23.Cryptographic techniques.mp4
[4ad5d5618d91d5d]
|
9,591,127 |
D72F00E2 |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.23.Cryptographic techniques.srt |
5,228 |
B3391BDE |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.24.Symmetric encryption.mp4
[baf67c35d86cc3b7]
|
10,145,116 |
A80E236C |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.24.Symmetric encryption.srt |
5,296 |
2FB3E51E |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.25.Asymmetric encryption.mp4
[7780a6b9b6bf9a68]
|
8,315,224 |
C8A3C7D3 |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.25.Asymmetric encryption.srt |
4,819 |
3EB87AAE |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.26.Public key infrastructure.mp4
[5db19a3730a22709]
|
7,411,666 |
FE6F09E0 |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption\07.26.Public key infrastructure.srt |
5,150 |
2C3087D4 |
LinkedIn Learning IT Security Foundations Operating System Security\08.Conclusion\08.27.Next steps.mp4
[432db5829cb97c5f]
|
2,577,582 |
816B5636 |
LinkedIn Learning IT Security Foundations Operating System Security\08.Conclusion\08.27.Next steps.srt |
1,641 |
55C868C0 |
LinkedIn Learning IT Security Foundations Operating System Security\01.Introduction |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\02.Understand User Authentication |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\03.Understand Permissions |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\04.Dissecting Audit Policies |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\05.Server Protection |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\06.Providing email protection |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\07.Understand Encryption |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security\08.Conclusion |
0 |
00000000 |
LinkedIn Learning IT Security Foundations Operating System Security |
0 |
00000000 |
|
Total size: |
253,593,449 |
|