RAR-files |
jgt-linux-host-security.rar |
15,000,000 |
8A98071B |
jgt-linux-host-security.r00 |
15,000,000 |
149623C6 |
jgt-linux-host-security.r01 |
15,000,000 |
1EA43BC3 |
jgt-linux-host-security.r02 |
15,000,000 |
2A6A1DE6 |
jgt-linux-host-security.r03 |
15,000,000 |
E6023CD8 |
jgt-linux-host-security.r04 |
15,000,000 |
A11A8E4A |
jgt-linux-host-security.r05 |
15,000,000 |
4466A3DA |
jgt-linux-host-security.r06 |
15,000,000 |
B3B41642 |
jgt-linux-host-security.r07 |
15,000,000 |
16919D7B |
jgt-linux-host-security.r08 |
15,000,000 |
C0735B08 |
jgt-linux-host-security.r09 |
15,000,000 |
72D75790 |
jgt-linux-host-security.r10 |
15,000,000 |
8CA475B3 |
jgt-linux-host-security.r11 |
15,000,000 |
65049DB3 |
jgt-linux-host-security.r12 |
15,000,000 |
B6A8A1D8 |
jgt-linux-host-security.r13 |
15,000,000 |
EAC7AC6A |
jgt-linux-host-security.r14 |
15,000,000 |
414319F7 |
jgt-linux-host-security.r15 |
15,000,000 |
A631671B |
jgt-linux-host-security.r16 |
15,000,000 |
36BAF4E5 |
jgt-linux-host-security.r17 |
15,000,000 |
911760F4 |
jgt-linux-host-security.r18 |
15,000,000 |
53DF98A5 |
jgt-linux-host-security.r19 |
15,000,000 |
D4F9789A |
jgt-linux-host-security.r20 |
15,000,000 |
B6237CBD |
jgt-linux-host-security.r21 |
15,000,000 |
11BFDA8B |
jgt-linux-host-security.r22 |
15,000,000 |
0AD864F6 |
jgt-linux-host-security.r23 |
15,000,000 |
013B2AEC |
jgt-linux-host-security.r24 |
15,000,000 |
0B034781 |
jgt-linux-host-security.r25 |
15,000,000 |
D75A0D0D |
jgt-linux-host-security.r26 |
15,000,000 |
389758C9 |
jgt-linux-host-security.r27 |
15,000,000 |
3F2F07AC |
jgt-linux-host-security.r28 |
15,000,000 |
7D01175C |
jgt-linux-host-security.r29 |
15,000,000 |
7E5ADEEE |
jgt-linux-host-security.r30 |
15,000,000 |
C47F2CA9 |
jgt-linux-host-security.r31 |
15,000,000 |
9B74A7CF |
jgt-linux-host-security.r32 |
15,000,000 |
1E31DEE9 |
jgt-linux-host-security.r33 |
15,000,000 |
28D57E6E |
jgt-linux-host-security.r34 |
15,000,000 |
DBC95782 |
jgt-linux-host-security.r35 |
15,000,000 |
FA09DD07 |
jgt-linux-host-security.r36 |
15,000,000 |
A72C40BD |
jgt-linux-host-security.r37 |
15,000,000 |
C77D46E9 |
jgt-linux-host-security.r38 |
15,000,000 |
68405A21 |
jgt-linux-host-security.r39 |
1,728,417 |
5862B98E |
|
Total size: |
601,728,417 |
|
|
Archived
files |
Pluralsight Linux Host Security\01.Course Overview\0101.Course Overview.mp4
[a6198f44336a2739]
|
4,695,178 |
9F5D5F7E |
Pluralsight Linux Host Security\02.The Linux Security Onion\0201.Understanding the Security Onion.mp4
[4b5decc93f2e47af]
|
17,075,950 |
7EBA0F1D |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0301.Understanding the Linux Procfs.mp4
[91eecc7a11a61a4d]
|
4,379,186 |
F958AB52 |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0302.Working with the Procfs.mp4
[d83ee2c7bc4ac194]
|
6,142,603 |
395CD4D3 |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0303.Tuning the Linux Kernel within the Procfs.mp4
[1eb38fe8d4e5f07c]
|
16,315,455 |
19041581 |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0304.Address Space Layout Randomization.mp4
[315ce53da552837c]
|
8,882,646 |
33032FEF |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0305.Securing ICMP within the Procfs.mp4
[ec4b9592aadeddb2]
|
5,611,921 |
C810EFAD |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl\0306.Summary and What's Next.mp4
[10328434ef6b20c7]
|
2,867,788 |
4EC80A56 |
Pluralsight Linux Host Security\04.Monitoring Ports and Services\0401.Why Analyse Ports and Services.mp4
[c151ea7b147be3db]
|
5,815,850 |
C75FEDCD |
Pluralsight Linux Host Security\04.Monitoring Ports and Services\0402.Listing Services.mp4
[a46b100874f001ff]
|
12,924,571 |
F14C8801 |
Pluralsight Linux Host Security\04.Monitoring Ports and Services\0403.Implementing an NTP Client without Server.mp4
[b87f5d013766d0cb]
|
6,550,837 |
0FAD6C46 |
Pluralsight Linux Host Security\04.Monitoring Ports and Services\0404.Filtering Ports Using the Command ss.mp4
[9055101bb7d5df13]
|
11,655,953 |
B2F1413B |
Pluralsight Linux Host Security\05.Understanding Chroot Jails\0501.Chrooting Users and Services.mp4
[69434dc75daf0d7f]
|
11,761,336 |
CEDD7EBC |
Pluralsight Linux Host Security\05.Understanding Chroot Jails\0502.Creating Chroot Jails.mp4
[8622470b239a5dc4]
|
19,760,944 |
300ECF0E |
Pluralsight Linux Host Security\05.Understanding Chroot Jails\0503.Chrooting SSH Logins.mp4
[fea7bf99a0c9675d]
|
7,756,792 |
29511BD5 |
Pluralsight Linux Host Security\05.Understanding Chroot Jails\0504.Summary and What's Next.mp4
[306c8514546809d9]
|
2,544,900 |
43BF00E3 |
Pluralsight Linux Host Security\06.Limiting User Access to Resources\0601.Why Limit User Access.mp4
[59a7a6c77c89bed1]
|
10,670,277 |
2051ABE1 |
Pluralsight Linux Host Security\06.Limiting User Access to Resources\0602.Working with Limits.mp4
[45827aa55b035d2c]
|
15,066,014 |
9D45DE68 |
Pluralsight Linux Host Security\06.Limiting User Access to Resources\0603.Summary and What's Next.mp4
[2c1515eabd020925]
|
4,717,180 |
1225473D |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords\0701.Inherent Virtual Machine Security.mp4
[1af5e07ba078ac89]
|
8,663,095 |
5D7EDF53 |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords\0702.Creating Fully Virtualized Machines.mp4
[92f6dd2fdfa395fe]
|
14,400,246 |
4D6E7E64 |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords\0703.Lost User Password Recovery.mp4
[e789f792238ab8c7]
|
9,600,972 |
545ED3C9 |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords\0704.Securing the GRUB Boot Process.mp4
[9bc32d01289fea13]
|
13,068,770 |
1996A6A5 |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords\0705.Summary and What's Next.mp4
[22c64f21a79d4423]
|
4,453,677 |
D2624374 |
Pluralsight Linux Host Security\08.The Linux Audit System\0801.Auditing in Linux.mp4
[e125c7cbd2905803]
|
12,850,262 |
8F0505DF |
Pluralsight Linux Host Security\08.The Linux Audit System\0802.Installing the Linux Audit System.mp4
[c1459fdc4532232e]
|
19,672,851 |
C45507EF |
Pluralsight Linux Host Security\08.The Linux Audit System\0803.Auditing Tools.mp4
[695d93ae079bdb59]
|
23,836,281 |
A4B7E0CE |
Pluralsight Linux Host Security\08.The Linux Audit System\0804.Default Configuration of Auditing.mp4
[ce56dd59f05f2d00]
|
10,577,521 |
3B8E1DE8 |
Pluralsight Linux Host Security\08.The Linux Audit System\0805.Working with Custom Rules.mp4
[e3fff972d56e48f0]
|
13,773,608 |
C8FF8D10 |
Pluralsight Linux Host Security\09.Linux Malware Detection\0901.Linux Does Not Have Viruses.mp4
[989a7371f2d20c8f]
|
13,338,116 |
CE3FFCF0 |
Pluralsight Linux Host Security\09.Linux Malware Detection\0902.Working with AIDE.mp4
[40bc7ebcf0aa5e8]
|
20,203,796 |
4CA0F9DC |
Pluralsight Linux Host Security\09.Linux Malware Detection\0903.Developing Your AIDE Strategy.mp4
[4ef48c84c2fbae09]
|
15,188,961 |
C3328221 |
Pluralsight Linux Host Security\09.Linux Malware Detection\0904.Rootkit Detection in Linux.mp4
[94a79e1c1e1782f7]
|
22,698,767 |
DFB67C05 |
Pluralsight Linux Host Security\09.Linux Malware Detection\0905.Linux Malware Detection with Maldet.mp4
[7621ea25a1f2844d]
|
17,719,632 |
BAFCAD2A |
Pluralsight Linux Host Security\09.Linux Malware Detection\0906.Summary and What's Next.mp4
[b87f546bba24b3ab]
|
5,196,414 |
26D2D8B7 |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP\1001.Identity Management in Linux.mp4
[a70c0ca665b88ce8]
|
9,057,239 |
4341BA5D |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP\1002.Configuring the OpenLDAP Appliance.mp4
[591488c53de99f1b]
|
14,681,890 |
E438B1FF |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP\1003.Creating OpenLDAP Users.mp4
[1f5c47b1b3c017bb]
|
11,533,264 |
0DEF9428 |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP\1004.Configuring SSSD on OpenLDAP Client Systems.mp4
[bafd7bee3cd8e90d]
|
33,399,603 |
63E5547F |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP\1005.Summary and What's Next.mp4
[8377aafba27e35a2]
|
3,981,588 |
2C0ABDE1 |
Pluralsight Linux Host Security\11.Implementing Kerberos Realms\1101.Deploying a KDC in Ubuntu 18.04.mp4
[e3bddb8f6770695e]
|
18,600,714 |
C2F0F4D1 |
Pluralsight Linux Host Security\11.Implementing Kerberos Realms\1102.Enabling Kerberos Authentication with SSH.mp4
[9dd059c017f474f8]
|
20,300,277 |
53EB5685 |
Pluralsight Linux Host Security\11.Implementing Kerberos Realms\1103.Summary and What's Next.mp4
[626824b802d59c52]
|
1,939,049 |
A3B4A246 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1201.Understanding the FreeIPA Server.mp4
[5f21f05cff9384f0]
|
14,190,870 |
F8F93470 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1202.Configuring CentOS 7 for FreeIPA.mp4
[f0706cf23eef558b]
|
5,961,831 |
6E18DE94 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1203.Installing the FreeIPA Server.mp4
[8720c3ccca54ea1f]
|
24,264,839 |
13A96407 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1204.Using the Web Interface.mp4
[895f328fb3c022eb]
|
8,531,459 |
A7AE7F62 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1205.Installing the FreeIPA Client.mp4
[e179efe4d296ef84]
|
14,452,072 |
03FBDB6E |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server\1206.Summary and What's Next.mp4
[5f70fdbbd9826cc7]
|
2,222,168 |
EA261908 |
Pluralsight Linux Host Security\Exercise Files\linux-host-security.zip |
12,191,314 |
74685C31 |
Pluralsight Linux Host Security\01.Course Overview |
0 |
00000000 |
Pluralsight Linux Host Security\02.The Linux Security Onion |
0 |
00000000 |
Pluralsight Linux Host Security\03.Tuning the Linux Kernel with Sysctl |
0 |
00000000 |
Pluralsight Linux Host Security\04.Monitoring Ports and Services |
0 |
00000000 |
Pluralsight Linux Host Security\05.Understanding Chroot Jails |
0 |
00000000 |
Pluralsight Linux Host Security\06.Limiting User Access to Resources |
0 |
00000000 |
Pluralsight Linux Host Security\07.Restricting Physical Access and Implementing GRUB Passwords |
0 |
00000000 |
Pluralsight Linux Host Security\08.The Linux Audit System |
0 |
00000000 |
Pluralsight Linux Host Security\09.Linux Malware Detection |
0 |
00000000 |
Pluralsight Linux Host Security\10.Centralizing User Accounts in OpenLDAP |
0 |
00000000 |
Pluralsight Linux Host Security\11.Implementing Kerberos Realms |
0 |
00000000 |
Pluralsight Linux Host Security\12.Implementing a FreeIPA Server |
0 |
00000000 |
Pluralsight Linux Host Security\Exercise Files |
0 |
00000000 |
Pluralsight Linux Host Security |
0 |
00000000 |
|
Total size: |
595,746,527 |
|
|