1 - Introduction to Network Defense Essential.mp4 (29.1 MB) MP4 2 - The overview of the different types of network defense approaches.mp4 (18.1 MB) MP4 3 - The different types of Network security controls.mp4 (32.2 MB) MP4 4 - Basic Linux concepts.mp4 (22.45 MB) MP4 38 - The implementation of an IDSIPS Snort on a Linux based system.mp4 (31.28 MB) MP4 39 - Installation of snort and its libraries Both Linux and ubuntu.mp4 (31.36 MB) MP4 40 - Configuration of snort for IDS IPS functionalities.mp4 (30.88 MB) MP4 41 - 103 Configuration of snort for IDSIPS functionalities.mp4 (30.87 MB) MP4 42 - How to setup a VPN.mp4 (26.21 MB) MP4 43 - Firewall installation configuration.mp4 (27.17 MB) MP4 44 - Timezone configuration and swap files in firewalld.mp4 (10.6 MB) MP4 5 - The different types of identifications overview.mp4 (6.2 MB) MP4 6 - The different types of authentications overview.mp4 (22.53 MB) MP4 7 - The different types of authorization overview.mp4 (13.72 MB) MP4 10 - Understanding the various environmental controls.mp4 (15.78 MB) MP4 8 - The different physical security attack vectors.mp4 (16.46 MB) MP4 9 - The different types of security controls.mp4 (26.35 MB) MP4 11 - Understanding Network segmentation and its types.mp4 (26.77 MB) MP4 12 - Understanding the different types of firewalls and their roles.mp4 (17.64 MB) MP4 13 - Understanding the different types of IDSIPS and their roles.mp4 (14.76 MB) MP4 14 - The different types of proxy servers and their benefits.mp4 (20.88 MB) MP4 15 - The fundamental understanding of VPN and their importance in a network.mp4 (26.82 MB) MP4 16 - VPN fundamental part 2.mp4 (35.53 MB) MP4 17 - Overview of antivirus antimalware software.mp4 (16.25 MB) MP4 18 - understanding virtualization and its components.mp4 (31.03 MB) MP4 19 - OS virtualization security.mp4 (32.67 MB) MP4 20 - Cloud computing and its benefits.mp4 (13.61 MB) MP4 21 - Overview of different types of cloud computing service.mp4 (32.3 MB) MP4 22 - Importance of cloud computing and its best practice.mp4 (19.75 MB) MP4 23 - Wireless network encryption mechanism.mp4 (15.93 MB) MP4 24 - Understanding the different types of wireless network authentication methods.mp4 (20.24 MB) MP4 25 - Wireless security measures and wireless security tools.mp4 (28.67 MB) MP4 26 - Understanding IoT architecture and communication models.mp4 (12.1 MB) MP4 27 - Understanding the best practice tool for IoT for security.mp4 (26.46 MB) MP4 28 - Cryptography techniques.mp4 (21.27 MB) MP4 29 - The different Encryption algorithm.mp4 (19.61 MB) MP4 30 - The different hashing algorithm.mp4 (20.21 MB) MP4 31 - Different cryptography tools and hash calculators.mp4 (13.86 MB) MP4 32 - PKI infrastructure.mp4 (13.79 MB) MP4 33 - The different data security controls for data encryption.mp4 (30.53 MB) MP4 34 - File encryption removablemedia encryption and disk encryption.mp4 (36.42 MB) MP4 35 - Methods and tools for data backup retention.mp4 (28.84 MB) MP4 36 - Methods and tools for data backup retention 2.mp4 (21.89 MB) MP4 37 - DLPS data loss prevention and solutions.mp4 (27.92 MB) MP4