Torrent Details

Photo Not Available
Linux Security and Hardening, The Practical Security Guide
Size728 MB in 99 files
ReleasesAdded Today at 10:19 into the Ebooks category by Unknown.
Status32 seeds & 12 peers.
Hash0bdd4f17e56505db8df1bc496fc7c7d805010ed1
Rating
  • YourBT Visitors

Status This torrent has been verified.
*

Torrent Description

Udemy Linux Security and Hardening, The Practical Security Guide

Course URL:

Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide



Similar Torrents

No Similar Torrents Found

If we find similar torrents, we normally show them right here. We couldn't find anything for "".

Torrent Trackers

TRACKER URLSEEDSPEERS
Onlineudp://tracker.pirateparty.gr:6969/announce328
Onlineudp://tracker.coppersurfer.tk:6969/announce2812
Onlineudp://tracker.open-internet.nl:6969/announce21

Files inside this torrent

FILENAMESIZE
icon 01 Course Overview and Downloads/001 Course Overview.mp42.9 MB
icon 01 Course Overview and Downloads/002 Course Downloads.html1.5 KB
icon 01 Course Overview and Downloads/002 Udemy-Help-Article-Downloading-Supplemental-Resources.txt540 B
icon 01 Course Overview and Downloads/002 linux-security-course-downloads.zip6.2 MB
icon 02 General Security/003 Section Overview-en.srt1.7 KB
icon 02 General Security/003 Section Overview.mp42.3 MB
icon 02 General Security/004 Is Linux Secure-en.srt3.1 KB
icon 02 General Security/004 Is Linux Secure.mp45.3 MB
icon 02 General Security/005 What Makes Linux Secure-en.srt10.3 KB
icon 02 General Security/005 What Makes Linux Secure.mp420.6 MB
icon 02 General Security/006 Security Guidelines and Principles-en.srt9.5 KB
icon 02 General Security/006 Security Guidelines and Principles.mp416.4 MB
icon 02 General Security/007 Section Summary-en.srt1.5 KB
icon 02 General Security/007 Section Summary.mp42.9 MB
icon 03 Physical Security/008 Section Overview-en.srt1010 B
icon 03 Physical Security/008 Section Overview.mp42.3 MB
icon 03 Physical Security/009 Physical Security Concepts-en.srt9.4 KB
icon 03 Physical Security/009 Physical Security Concepts.mp426.9 MB
icon 03 Physical Security/010 Single User Mode Security-en.srt5.6 KB
icon 03 Physical Security/010 Single User Mode Security.mp433.2 MB
icon 03 Physical Security/011 Single User Mode and Blank Passwords-en.srt3.2 KB
icon 03 Physical Security/011 Single User Mode and Blank Passwords.mp423.5 MB
icon 03 Physical Security/012 Securing the Boot Loader-en.srt7.3 KB
icon 03 Physical Security/012 Securing the Boot Loader.mp432.4 MB
icon 03 Physical Security/013 Disk Encryption-en.srt7.1 KB
icon 03 Physical Security/013 Disk Encryption.mp416.5 MB
icon 03 Physical Security/014 Encrypting a New Device Part I-en.srt7.6 KB
icon 03 Physical Security/014 Encrypting a New Device Part I.mp443.5 MB
icon 03 Physical Security/015 Encrypting a New Device Part II-en.srt2.9 KB
icon 03 Physical Security/015 Encrypting a New Device Part II.mp419.4 MB
icon 03 Physical Security/016 Encrypting an Existing Device-en.srt1.2 KB
icon 03 Physical Security/016 Encrypting an Existing Device.mp43.4 MB
icon 03 Physical Security/017 Disabling Control Alt Delete-en.srt2.2 KB
icon 03 Physical Security/017 Disabling Control Alt Delete.mp48.5 MB
icon 03 Physical Security/018 Section Summary-en.srt896 B
icon 03 Physical Security/018 Section Summary.mp41.4 MB
icon 04 Account Security/019 Section Overview-en.srt1.1 KB
icon 04 Account Security/019 Section Overview.mp41.1 MB
icon 04 Account Security/020 Intro to PAM-en.srt5.2 KB
icon 04 Account Security/020 Intro to PAM.mp47.9 MB
icon 04 Account Security/021 PAM Configuration Example-en.srt4.4 KB
icon 04 Account Security/021 PAM Configuration Example.mp49.1 MB
icon 04 Account Security/022 Password Security-en.srt8.9 KB
icon 04 Account Security/022 Password Security.mp412.7 MB
icon 04 Account Security/023 Account Security Demo 1 (UID 0)-en.srt4.5 KB
icon 04 Account Security/023 Account Security Demo 1 (UID 0)-es.srt3.7 KB
icon 04 Account Security/023 Account Security Demo 1 (UID 0)-pt.srt3.6 KB
icon 04 Account Security/023 Account Security Demo 1 (UID 0).mp48.9 MB
icon 04 Account Security/024 Controlling Account Access-en.srt5.5 KB
icon 04 Account Security/024 Controlling Account Access.mp49.2 MB
icon 04 Account Security/025 Security by Account Type-en.srt6.9 KB
icon 04 Account Security/025 Security by Account Type.mp410 MB
icon 04 Account Security/026 Account Security Demo 2-en.srt1.7 KB
icon 04 Account Security/026 Account Security Demo 2.mp45.9 MB
icon 04 Account Security/027 Account Security Demo 3 (Sudo)-en.srt4.4 KB
icon 04 Account Security/027 Account Security Demo 3 (Sudo).mp417.9 MB
icon 05 Network Security/028 Section Overview-en.srt669 B
icon 05 Network Security/028 Section Overview-es.srt700 B
icon 05 Network Security/028 Section Overview-pt.srt669 B
icon 05 Network Security/028 Section Overview.mp41.2 MB
icon 05 Network Security/029 Network Security Part I-en.srt9.2 KB
icon 05 Network Security/029 Network Security Part I.mp416.6 MB
icon 05 Network Security/030 Network Security Part II-en.srt7.4 KB
icon 05 Network Security/030 Network Security Part II.mp415.9 MB
icon 05 Network Security/031 Securing SSHD Part I-en.srt9.7 KB
icon 05 Network Security/031 Securing SSHD Part I.mp414.3 MB
icon 05 Network Security/032 Securing SSHD Part II-en.srt3.5 KB
icon 05 Network Security/032 Securing SSHD Part II.mp45 MB
icon 05 Network Security/033 Linux Firewall Fundamentals-en.srt8.9 KB
icon 05 Network Security/033 Linux Firewall Fundamentals.mp416 MB
icon 05 Network Security/034 Configuring the Firewall from the Command Line-en.srt3.9 KB
icon 05 Network Security/034 Configuring the Firewall from the Command Line.mp410.8 MB
icon 05 Network Security/035 Firewall Rule Specifications-en.srt39.4 KB
icon 05 Network Security/035 Firewall Rule Specifications.mp414.4 MB
icon 05 Network Security/036 Example Firewall Rules-en.srt4.9 KB
icon 05 Network Security/036 Example Firewall Rules.mp411 MB
icon 05 Network Security/037 Linux Firewall Demonstration-en.srt7.9 KB
icon 05 Network Security/037 Linux Firewall Demonstration.mp432.8 MB
icon 05 Network Security/038 TCP Wrappers Part I-en.srt7.5 KB
icon 05 Network Security/038 TCP Wrappers Part I.mp413.8 MB
icon 05 Network Security/039 TCP Wrappers Part II-en.srt3.9 KB
icon 05 Network Security/039 TCP Wrappers Part II-es.srt4.3 KB
icon 05 Network Security/039 TCP Wrappers Part II-pt.srt4.1 KB
icon 05 Network Security/039 TCP Wrappers Part II.mp47.7 MB
icon 06 File System Security/040 Section Overview-en.srt1016 B
icon 06 File System Security/040 Section Overview.mp42 MB
icon 06 File System Security/041 File and Directory Permissions Intro-en.srt679 B
icon 06 File System Security/041 File and Directory Permissions Intro-es.srt714 B
icon 06 File System Security/041 File and Directory Permissions Intro-pt.srt718 B
icon 06 File System Security/041 File and Directory Permissions Intro.mp4497.4 KB
icon 06 File System Security/042 File and Directory Permissions Part I-en.srt8.9 KB
icon 06 File System Security/042 File and Directory Permissions Part I.mp420 MB
icon 06 File System Security/043 File and Directory Permissions Part II-en.srt11.9 KB
icon 06 File System Security/043 File and Directory Permissions Part II.mp418.9 MB
icon 06 File System Security/044 Special Modes Part I-en.srt13.8 KB
icon 06 File System Security/044 Special Modes Part I-es.srt11.4 KB
icon 06 File System Security/044 Special Modes Part I-pt.srt11.2 KB
icon 06 File System Security/044 Special Modes Part I.mp416.8 MB
icon 06 File System Security/051 Rootkit Hunter Demonstration.mp454.8 MB