It is what it is.
  • Anonymous
  • 2020-04-15 21:43:19
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 NOLEDGE File size CRC
Download
16,658
Stored files
2,643 34743783
1,218 7FA7C0D3
RAR-files
noledge-securing-the-switch.rar 15,000,000 75B03346
noledge-securing-the-switch.r00 15,000,000 DEFC6562
noledge-securing-the-switch.r01 15,000,000 12ED7C36
noledge-securing-the-switch.r02 15,000,000 22C7C593
noledge-securing-the-switch.r03 15,000,000 F7AED5D1
noledge-securing-the-switch.r04 15,000,000 BFD6473C
noledge-securing-the-switch.r05 15,000,000 19A5E12A
noledge-securing-the-switch.r06 15,000,000 CB7DD7CD
noledge-securing-the-switch.r07 15,000,000 E74B0995
noledge-securing-the-switch.r08 15,000,000 6CDD0D0A
noledge-securing-the-switch.r09 15,000,000 BB295DF3
noledge-securing-the-switch.r10 15,000,000 817FB278
noledge-securing-the-switch.r11 15,000,000 4D7396F6
noledge-securing-the-switch.r12 15,000,000 1B5A4D6D
noledge-securing-the-switch.r13 15,000,000 BC2961AF
noledge-securing-the-switch.r14 15,000,000 6EC1A47B
noledge-securing-the-switch.r15 15,000,000 4CC347B0
noledge-securing-the-switch.r16 15,000,000 ED555031
noledge-securing-the-switch.r17 15,000,000 FD75563F
noledge-securing-the-switch.r18 15,000,000 998DED56
noledge-securing-the-switch.r19 15,000,000 17ED3B79
noledge-securing-the-switch.r20 15,000,000 585A9042
noledge-securing-the-switch.r21 15,000,000 4FB11DB5
noledge-securing-the-switch.r22 15,000,000 62C1AEA5
noledge-securing-the-switch.r23 15,000,000 7B7FE264
noledge-securing-the-switch.r24 15,000,000 D9B9EDBB
noledge-securing-the-switch.r25 15,000,000 E2DE6B73
noledge-securing-the-switch.r26 15,000,000 5AF4B4B0
noledge-securing-the-switch.r27 9,387,808 92598559

Total size: 429,387,808
Archived files
Securing-the-Switch\01_Course_Overview\01_Course_Overview.mp4 [8a0c6025097b6f6d] 4,493,018 39BE90F0
Securing-the-Switch\04_Switchport_Port_Security\22_Demo_How_Switches_Deal_with_Violations_Protect.mp4 [b33c5c5e09b6283e] 13,728,444 333AAEF4
Securing-the-Switch\04_Switchport_Port_Security\23_Demo_Configuring_Allowed_MAC_Addresses_on_Ports_Static.mp4 [7f5a8922fa1f64f7] 24,307,275 400C8EE0
Securing-the-Switch\04_Switchport_Port_Security\16_The_Flooding_Attack.mp4 [f481afd1b4de66bf] 10,121,075 3349A843
Securing-the-Switch\04_Switchport_Port_Security\21_Demo_How_Switches_Deal_with_Violations_Restrict.mp4 [91e467dc72cea6e7] 16,969,996 46B23E43
Securing-the-Switch\04_Switchport_Port_Security\25_Summary.mp4 [60fe72461af24b9e] 933,726 A2D1FDA8
Securing-the-Switch\04_Switchport_Port_Security\18_What_Does_a_Switch_Do_When_It_Gets_a_Bad_Frame.mp4 [9cab10db3f729ca8] 11,624,842 2EDC974E
Securing-the-Switch\04_Switchport_Port_Security\19_Demo_Setting_up_the_Initial_Port_Security.mp4 [b94924648814a8dc] 34,783,632 868F9828
Securing-the-Switch\04_Switchport_Port_Security\20_Demo_Examining_What_Happens_When_There_Are_Port_Security_Violations.mp4 [92ef51e9bece89ab] 36,894,668 9E5B3DDB
Securing-the-Switch\04_Switchport_Port_Security\17_What_Is_Switchport_Port_Security.mp4 [1d4324a7106a561c] 14,371,726 F4646299
Securing-the-Switch\04_Switchport_Port_Security\15_Introduction.mp4 [e8ef0a665eb98824] 703,285 A87FFC0B
Securing-the-Switch\04_Switchport_Port_Security\24_Demo_Configuring_Allowed_MAC_Addresses_on_Ports_Sticky.mp4 [552c3c808dbae3cf] 14,745,394 8836CBBC
Securing-the-Switch\exercise_file.zip 2,386,338 F24BAF0C
Securing-the-Switch\05_Check_Your_Knowledge\28_Demo_Configuring_Secure_Trunk_Links_on_a_Switch.mp4 [879fac81c9a0d2f6] 23,580,269 F2A0E541
Securing-the-Switch\05_Check_Your_Knowledge\30_Demo_Troubleshooting_Port_Security_Issues.mp4 [8ca4429ec7d1f3a9] 38,786,138 C239469B
Securing-the-Switch\05_Check_Your_Knowledge\31_Summary.mp4 [148909731e278007] 1,552,433 3ADF95B3
Securing-the-Switch\05_Check_Your_Knowledge\26_Introduction.mp4 [a15031a29d77fa1d] 865,880 050558B8
Securing-the-Switch\05_Check_Your_Knowledge\27_Demo_Setting_up_the_Initial_Secure_Configuration_on_the_Switch.mp4 [347bd3d2512416be] 26,359,929 6A6D43CA
Securing-the-Switch\05_Check_Your_Knowledge\29_Demo_Troubleshooting_Native_VLAN_Issues.mp4 [118add2ef6882ccb] 25,266,159 B43D05DF
Securing-the-Switch\02_The_Native_VLAN\08_Summary.mp4 [8e32d7e83a7d8a80] 1,652,914 EFCAA418
Securing-the-Switch\02_The_Native_VLAN\06_Demo_Examining_the_Configurations_on_Switch_1_and_2.mp4 [5f23194de4ea7dc0] 11,742,637 6A636537
Securing-the-Switch\02_The_Native_VLAN\03_What_Is_the_Native_VLAN.mp4 [3647c6f4bd4c33e7] 7,172,840 3C67BA83
Securing-the-Switch\02_The_Native_VLAN\05_Preventing_VLAN_Hopping.mp4 [ad8308d9feb42073] 9,394,176 48964CA4
Securing-the-Switch\02_The_Native_VLAN\07_Demo_Capturing_Tagged_and_Untagged_Frames_in_Wireshark.mp4 [7f7b58173f20f296] 23,565,327 2BD7059F
Securing-the-Switch\02_The_Native_VLAN\04_Native_VLAN_Security_Concerns_VLAN_Hopping.mp4 [ea258350a94f1591] 7,015,358 09DFD4A2
Securing-the-Switch\02_The_Native_VLAN\02_Introduction.mp4 [6a83c24cd8ee8995] 1,078,914 15F7CEF5
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\13_Demo_Examining_Behavior_of_an_Access_Port_and_a_Trunk_Port.mp4 [239b0f602370d5c8] 22,608,593 49645925
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\11_Demo_Examining_the_Behavior_of_an_Access_Port.mp4 [2a9085b536b44669] 9,057,894 7912C3AA
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\10_What_Is_Dynamic_Trunking_Protocol_DTP.mp4 [d71b7e2b34589c95] 15,456,982 797E978E
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\14_Summary.mp4 [226359ef157a9b3d] 1,091,098 A61AEB81
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\12_Demo_Examining_the_Behavior_of_an_Access_Port_and_a_Dynamic_Desirable_Port.mp4 [2ceb3641066c5440] 16,539,126 66F360A0
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP\09_Introduction.mp4 [bd32fff9cd8cc534] 528,285 76891F37
Securing-the-Switch\01_Course_Overview 0 00000000
Securing-the-Switch\04_Switchport_Port_Security 0 00000000
Securing-the-Switch\05_Check_Your_Knowledge 0 00000000
Securing-the-Switch\02_The_Native_VLAN 0 00000000
Securing-the-Switch\03_Dynamic_Trunking_Protocol_DTP 0 00000000
Securing-the-Switch 0 00000000

Total size: 429,378,371
RAR Recovery
Not Present
Labels UNKNOWN