Magnetic link has been copied to the cutting board

Name [CourserHub.com] Coursera - Connect and Protect Networks and Network Security

File Type video

Size 342.71MB

UpdateDate 2024-10-8

hash *****E1BC06F96379F75741958E354D8C0BFA57

Hot 31

Files 0. Websites you may like/[CourserHub.com].url | 123B 01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.srt | 1.75KB 01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.en.txt | 1.10KB 01_network-architecture/01_get-started-with-the-course/01_introduction-to-course-3.mp4 | 3.60MB 01_network-architecture/01_get-started-with-the-course/02_course-3-overview_instructions.html | 1.22MB 01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_Google_Cybersecurity_Certificate_glossary.docx | 879.17KB 01_network-architecture/01_get-started-with-the-course/03_helpful-resources-and-tips_instructions.html | 11.22KB 01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.srt | 863B 01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.en.txt | 533B 01_network-architecture/02_introduction-to-networks/01_welcome-to-week-1.mp4 | 2.30MB 01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.srt | 4.91KB 01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.en.txt | 2.63KB 01_network-architecture/02_introduction-to-networks/02_chris-my-path-to-cybersecurity.mp4 | 18.89MB 01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.srt | 2.66KB 01_network-architecture/02_introduction-to-networks/03_what-are-networks.en.txt | 1.64KB 01_network-architecture/02_introduction-to-networks/03_what-are-networks.mp4 | 6.22MB 01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.srt | 3.06KB 01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.en.txt | 1.64KB 01_network-architecture/02_introduction-to-networks/04_tina-working-in-network-security.mp4 | 11.31MB 01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.srt | 4.86KB 01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.en.txt | 2.51KB 01_network-architecture/02_introduction-to-networks/05_emmanuel-useful-skills-for-network-security.mp4 | 13.44MB 01_network-architecture/02_introduction-to-networks/06_network-tools.en.srt | 4.48KB 01_network-architecture/02_introduction-to-networks/06_network-tools.en.txt | 2.44KB 01_network-architecture/02_introduction-to-networks/06_network-tools.mp4 | 7.03MB 01_network-architecture/02_introduction-to-networks/07_network-components-devices-and-diagrams_instructions.html | 1.68MB 01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.srt | 3.58KB 01_network-architecture/02_introduction-to-networks/08_cloud-networks.en.txt | 2.33KB 01_network-architecture/02_introduction-to-networks/08_cloud-networks.mp4 | 8.77MB 01_network-architecture/02_introduction-to-networks/09_cloud-computing-and-software-defined-networks_instructions.html | 694.11KB 01_network-architecture/02_introduction-to-networks/10_test-your-knowledge-introduction-to-networks_quiz.html | 3.51KB 01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.srt | 3.67KB 01_network-architecture/03_network-communication/01_introduction-to-network-communication.en.txt | 2.35KB 01_network-architecture/03_network-communication/01_introduction-to-network-communication.mp4 | 7.25MB 01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.srt | 4.42KB 01_network-architecture/03_network-communication/02_the-tcp-ip-model.en.txt | 2.37KB 01_network-architecture/03_network-communication/02_the-tcp-ip-model.mp4 | 8.96MB 01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.srt | 3.41KB 01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.en.txt | 1.83KB 01_network-architecture/03_network-communication/03_the-four-layers-of-the-tcp-ip-model.mp4 | 6.47MB 01_network-architecture/03_network-communication/04_learn-more-about-the-tcp-ip-model_instructions.html | 1.53MB 01_network-architecture/03_network-communication/05_the-osi-model_instructions.html | 302.88KB 01_network-architecture/03_network-communication/06_test-your-knowledge-network-communication_quiz.html | 4.89KB 01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.srt | 4.16KB 01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.en.txt | 2.21KB 01_network-architecture/04_local-and-wide-network-communication/01_ip-addresses-and-network-communication.mp4 | 7.31MB 01_network-architecture/04_local-and-wide-network-communication/02_components-of-network-layer-communication_instructions.html | 642.17KB 01_network-architecture/04_local-and-wide-network-communication/03_test-your-knowledge-local-and-wide-network-communication_quiz.html | 3.67KB 01_network-architecture/05_review-network-architecture/01_wrap-up.en.srt | 1.03KB 01_network-architecture/05_review-network-architecture/01_wrap-up.en.txt | 620B 01_network-architecture/05_review-network-architecture/01_wrap-up.mp4 | 1.71MB 01_network-architecture/05_review-network-architecture/02_glossary-terms-from-week-1_instructions.html | 4.49KB 01_network-architecture/05_review-network-architecture/03_weekly-challenge-1_exam.html | 8.39KB 02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.srt | 1.98KB 02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.en.txt | 1.09KB 02_network-operations/01_introduction-to-network-protocols/01_welcome-to-week-2.mp4 | 4.60MB 02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.srt | 6.01KB 02_network-operations/01_introduction-to-network-protocols/02_network-protocols.en.txt | 3.27KB 02_network-operations/01_introduction-to-network-protocols/02_network-protocols.mp4 | 11.29MB 02_network-operations/01_introduction-to-network-protocols/03_common-network-protocols_instructions.html | 8.69KB 02_network-operations/01_introduction-to-network-protocols/04_additional-network-protocols_instructions.html | 11.08KB 02_network-operations/01_introduction-to-network-protocols/05_test-your-knowledge-recognize-different-network-protocols_quiz.html | 3.44KB 02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.srt | 2.12KB 02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.en.txt | 1.10KB 02_network-operations/01_introduction-to-network-protocols/06_wireless-protocols.mp4 | 5.11MB 02_network-operations/01_introduction-to-network-protocols/07_the-evolution-of-wireless-security-protocols_instructions.html | 159.17KB 02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.srt | 7.40KB 02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.en.txt | 3.95KB 02_network-operations/02_system-identification/01_firewalls-and-network-security-measures.mp4 | 16.81MB 02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.srt | 4.30KB 02_network-operations/02_system-identification/02_virtual-private-networks-vpns.en.txt | 2.28KB 02_network-operations/02_system-identification/02_virtual-private-networks-vpns.mp4 | 8.06MB 02_network-operations/02_system-identification/03_security-zones.en.srt | 6.05KB 02_network-operations/02_system-identification/03_security-zones.en.txt | 3.20KB 02_network-operations/02_system-identification/03_security-zones.mp4 | 12.00MB 02_network-operations/02_system-identification/04_subnetting-and-cidr_instructions.html | 133.92KB 02_network-operations/02_system-identification/05_proxy-servers.en.srt | 4.94KB 02_network-operations/02_system-identification/05_proxy-servers.en.txt | 3.12KB 02_network-operations/02_system-identification/05_proxy-servers.mp4 | 11.21MB 02_network-operations/02_system-identification/06_virtual-networks-and-privacy_instructions.html | 8.43KB 02_network-operations/02_system-identification/07_test-your-knowledge-system-identification_quiz.html | 4.29KB 02_network-operations/03_review-network-operations/01_wrap-up.en.srt | 1.10KB 02_network-operations/03_review-network-operations/01_wrap-up.en.txt | 727B 02_network-operations/03_review-network-operations/01_wrap-up.mp4 | 2.77MB 02_network-operations/03_review-network-operations/02_glossary-terms-from-week-2_instructions.html | 5.09KB 02_network-operations/03_review-network-operations/03_weekly-challenge-2_exam.html | 8.45KB 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.srt | 710B 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.en.txt | 447B 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/01_welcome-to-week-3.mp4 | 1.32MB 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.srt | 2.20KB 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.en.txt | 1.41KB 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/02_the-case-for-securing-networks.mp4 | 5.52MB 03_secure-against-network-intrusions/01_introduction-to-network-intrusion-tactics/03_how-intrusions-compromise-your-system_instructions.html | 6.62KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.srt | 7.83KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.en.txt | 4.21KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/01_denial-of-service-dos-attacks.mp4 | 18.55MB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/02_read-tcpdump-logs_instructions.html | 146.64KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/03_activity-analyze-network-layer-communication_quiz.html | 1.26KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/04_real-life-ddos-attack_instructions.html | 5.12KB 03_secure-against-network-intrusions/02_secure-networks-against-denial-of-service-dos-attacks/05_test-your-knowledge-secure-networks-against-denial-of-service-dos-attacks_quiz.html | 3.84KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.srt | 8.04KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.en.txt | 4.29KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/01_malicious-packet-sniffing.mp4 | 19.32MB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.srt | 5.13KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.en.txt | 2.72KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/02_ip-spoofing.mp4 | 11.52MB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/03_overview-of-interception-tactics_instructions.html | 7.19KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/04_activity-analyze-network-attacks_quiz.html | 1.25KB 03_secure-against-network-intrusions/03_network-attack-tactics-and-defense/05_test-your-knowledge-network-interception-attack-tactics_quiz.html | 4.01KB 03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.srt | 1.35KB 03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.en.txt | 747B 03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/01_wrap-up.mp4 | 2.93MB 03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/02_glossary-terms-from-week-3_instructions.html | 3.75KB 03_secure-against-network-intrusions/04_review-secure-against-network-intrusion/03_weekly-challenge-3_exam.html | 9.31KB 04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.srt | 1.50KB 04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.en.txt | 929B 04_security-hardening/01_introduction-to-security-hardening/01_welcome-to-week-4.mp4 | 3.84MB 04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.srt | 4.62KB 04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.en.txt | 2.93KB 04_security-hardening/01_introduction-to-security-hardening/02_security-hardening.mp4 | 12.25MB 04_security-hardening/02_os-hardening/01_os-hardening-practices.en.srt | 7.52KB 04_security-hardening/02_os-hardening/01_os-hardening-practices.en.txt | 3.97KB 04_security-hardening/02_os-hardening/01_os-hardening-practices.mp4 | 18.03MB 04_security-hardening/02_os-hardening/02_brute-force-attacks-and-os-hardening_instructions.html | 8.12KB 04_security-hardening/02_os-hardening/03_activity-apply-os-hardening-techniques_quiz.html | 1.26KB 04_security-hardening/02_os-hardening/04_test-your-knowledge-os-hardening_quiz.html | 3.69KB 04_security-hardening/03_network-hardening/01_network-hardening-practices.en.srt | 6.19KB 04_security-hardening/03_network-hardening/01_network-hardening-practices.en.txt | 3.31KB 04_security-hardening/03_network-hardening/01_network-hardening-practices.mp4 | 16.90MB 04_security-hardening/03_network-hardening/02_network-security-applications_instructions.html | 2.90MB 04_security-hardening/03_network-hardening/03_activity-analysis-of-network-hardening_quiz.html | 1.23KB 04_security-hardening/03_network-hardening/04_test-your-knowledge-network-hardening_quiz.html | 3.78KB 04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.srt | 2.82KB 04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.en.txt | 1.84KB 04_security-hardening/04_cloud-hardening/01_network-security-in-the-cloud.mp4 | 9.73MB 04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.srt | 3.79KB 04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.en.txt | 2.31KB 04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 | 21.94MB 04_security-hardening/04_cloud-hardening/03_secure-the-cloud_instructions.html | 8.98KB 04_security-hardening/04_cloud-hardening/04_test-your-knowledge-cloud-hardening_quiz.html | 3.62KB 04_security-hardening/05_review-security-hardening/01_wrap-up.en.srt | 1.58KB 04_security-hardening/05_review-security-hardening/01_wrap-up.en.txt | 909B 04_security-hardening/05_review-security-hardening/01_wrap-up.mp4 | 3.14MB 04_security-hardening/05_review-security-hardening/02_glossary-terms-from-week-4_instructions.html | 2.83KB 04_security-hardening/05_review-security-hardening/03_weekly-challenge-4_exam.html | 9.52KB 04_security-hardening/05_review-security-hardening/04_portfolio-activity-use-the-nist-cybersecurity-framework-to-respond-to-a-security_exam.html | 3.46KB 04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.srt | 2.94KB 04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.en.txt | 1.86KB 04_security-hardening/06_congratulations-on-completing-course-3/01_course-wrap-up.mp4 | 6.64MB 04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_Course_3_glossary.docx | 857.56KB 04_security-hardening/06_congratulations-on-completing-course-3/02_course-3-glossary_instructions.html | 6.45KB 04_security-hardening/06_congratulations-on-completing-course-3/03_get-started-on-the-next-course_instructions.html | 786.47KB 05_Resources/01_frequently-asked-questions/01__resources.html | 18.56KB 05_Resources/02_google-cybersecurity-certificate-glossary/01__Course_5_glossary.docx | 862.38KB 05_Resources/02_google-cybersecurity-certificate-glossary/01__resources.html | 6.53KB 05_Resources/03_course-3-glossary/01__Course_3_glossary.docx | 857.56KB 05_Resources/03_course-3-glossary/01__resources.html | 6.45KB 05_Resources/04_course-3-resources-and-citations/01__7.1 | 11.65KB 05_Resources/04_course-3-resources-and-citations/01__7.2 | 7.49KB 05_Resources/04_course-3-resources-and-citations/01__aa494182vexchg.140 | 33.90KB 05_Resources/04_course-3-resources-and-citations/01__article.asp | 62.82KB 05_Resources/04_course-3-resources-and-citations/01__index.html | 22.90KB 05_Resources/04_course-3-resources-and-citations/01__resources.html | 17.59KB 05_Resources/04_course-3-resources-and-citations/01__sp800-179r1-draft.pdf | 1.82MB 05_Resources/04_course-3-resources-and-citations/01__what-is-a-firewall.html | 61.21KB 05_Resources/05_frequently-asked-questions/01__resources.html | 15.95KB 05_Resources/06_create-a-cybersecurity-portfolio/01__resources.html | 8.76KB Readme.txt | 51B

Recommend

Magnetic link has been copied to the cutting board