搜索
[CourserHub.com] Coursera - Computer Security and Systems Management Specialization
磁力链接/BT种子名称
[CourserHub.com] Coursera - Computer Security and Systems Management Specialization
磁力链接/BT种子简介
种子哈希:
48003321319e824e4c6fdd2939f26785f22b6ff9
文件大小:
2.37G
已经下载:
2212
次
下载速度:
极快
收录时间:
2024-01-15
最近下载:
2024-11-14
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:48003321319E824E4C6FDD2939F26785F22B6FF9
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
nfo
探花明星脸
24 11 12 2160p
military+
黑木
みかん果汁100%
小宝情侣装
重庆女大
mark davis
上原保奈美.
地上
吴昊昊
做爱夫妻
milf sensually stripping
x264 horizon
推特博主【我的枪好长啊】持久肌肉体育生联合单男3p爆操羞辱极品身材
佟丽娅
自発
ssis-893
hotcrazymess daddy issues
图包
金髪エルフのご奉仕
大熊探花小美模被操哭了
farting
ipx-217
i only want sex
搐
2020.10
cum swallow dad
676186
文件列表
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.mp4
162.8 MB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.mp4
162.8 MB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.mp4
162.8 MB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.mp4
162.8 MB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.mp4
64.1 MB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.mp4
56.3 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.mp4
54.6 MB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.mp4
49.1 MB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.mp4
48.8 MB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.mp4
48.7 MB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.mp4
46.9 MB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.mp4
46.2 MB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.mp4
44.0 MB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.mp4
43.9 MB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.mp4
43.9 MB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.mp4
43.2 MB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.mp4
42.3 MB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.mp4
42.2 MB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.mp4
41.4 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.mp4
41.0 MB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.mp4
40.8 MB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.mp4
40.3 MB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.mp4
39.7 MB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.mp4
39.5 MB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.mp4
39.5 MB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.mp4
39.3 MB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.mp4
38.6 MB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.mp4
38.5 MB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.mp4
37.3 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.mp4
37.1 MB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.mp4
35.5 MB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.mp4
35.0 MB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.mp4
33.5 MB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.mp4
33.4 MB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.mp4
31.4 MB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.mp4
31.0 MB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.mp4
30.8 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.mp4
30.4 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.mp4
29.2 MB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.mp4
27.0 MB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.mp4
25.8 MB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.mp4
25.6 MB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.mp4
25.5 MB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.mp4
23.1 MB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.mp4
23.1 MB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.mp4
22.7 MB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.mp4
22.1 MB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.mp4
19.7 MB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.mp4
18.2 MB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.mp4
17.6 MB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.mp4
17.0 MB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.mp4
15.8 MB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.mp4
15.5 MB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.mp4
14.3 MB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.mp4
14.1 MB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.mp4
12.8 MB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.mp4
11.9 MB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.mp4
11.8 MB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.mp4
11.6 MB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.mp4
10.6 MB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.mp4
10.1 MB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.mp4
9.7 MB
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.mp4
9.6 MB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.mp4
9.5 MB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.mp4
8.9 MB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.mp4
8.4 MB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.mp4
8.3 MB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.mp4
7.6 MB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.srt
16.8 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.srt
13.6 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.srt
13.2 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.srt
13.1 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.srt
13.0 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.srt
12.7 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.srt
12.6 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.srt
11.0 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.srt
11.0 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.srt
11.0 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.srt
11.0 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.srt
10.8 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.srt
10.8 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.srt
10.7 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.srt
10.6 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.srt
10.6 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.srt
10.5 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.srt
10.4 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.srt
10.4 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.srt
10.3 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.srt
9.9 kB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/04_active-directory.en.txt
9.9 kB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.srt
9.8 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.srt
9.7 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.srt
9.5 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.srt
9.4 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.srt
9.2 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.srt
9.2 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.srt
9.2 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.srt
9.2 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.srt
9.1 kB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.srt
8.8 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.srt
8.7 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.srt
8.7 kB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.srt
8.5 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.srt
8.4 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.srt
8.3 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.srt
8.3 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/03_linux-security.en.txt
8.2 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.srt
8.2 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.srt
8.2 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.srt
8.1 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/04_risk-in-system-management.en.txt
7.9 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.srt
7.9 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.srt
7.7 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/04_auditing.en.txt
7.7 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/03_what-is-enterprise-computing.en.txt
7.6 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/07_syslog.en.txt
7.6 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.srt
7.6 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/06_ssh.en.txt
7.5 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.srt
7.5 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.srt
7.5 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.srt
7.3 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.srt
7.3 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.srt
7.2 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.srt
7.2 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.srt
7.0 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.srt
7.0 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.srt
6.9 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/05_networking-in-windows.en.txt
6.7 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.srt
6.5 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.srt
6.5 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/01_linux-in-the-enterprise.en.txt
6.5 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/02_about-linux/02_about-linux-and-distributions.en.txt
6.4 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/04_about-the-instructor.en.txt
6.4 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/01_security-at-the-forefront.en.txt
6.4 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.srt
6.4 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/04_about-the-instructor.en.txt
6.4 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/03_restricting-access-to-software-and-resources.en.txt
6.4 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.srt
6.4 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.srt
6.4 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/04_about-the-instructor.en.txt
6.3 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/05_about-the-instructor.en.txt
6.3 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/07_if-you-build-it-they-will-get-around-it.en.txt
6.3 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/06_working-with-other-systems.en.txt
6.2 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.srt
6.2 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/05_services-within-linux.en.txt
6.2 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/05_confidentiality-integrity-and-availability.en.txt
6.0 kB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/01_why-do-we-need-to-learn-networking.en.txt
6.0 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/06_planning-for-disaster.en.txt
5.9 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/01_policies-part-1-organizational-policies.en.txt
5.9 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.srt
5.9 kB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.srt
5.8 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.srt
5.7 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/02_attack-surfaces.en.txt
5.7 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/02_types-of-virtualization.en.txt
5.7 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/01_built-in-security-controls.en.txt
5.7 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.srt
5.6 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.srt
5.6 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/05_security-considerations-for-windows-systems.en.txt
5.5 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/05_access-control.en.txt
5.5 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/01_selinux.en.txt
5.5 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.srt
5.3 kB
enterprise-system-management-security/02_doesn-t-everything-work-on-wireless-an-introduction-to-enterprise-networking/01_an-introduction-to-networking/05_osi-model.en.txt
5.3 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/04_your-computer-vs-an-enterprise-system.en.txt
5.2 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/05_separation-of-duties.en.txt
5.2 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/01_strategies-for-monitoring.en.txt
5.1 kB
linux-server-management-security/04_securing-linux-in-the-enterprise/01_linux-security/04_software-firewalls-in-linux.en.txt
5.1 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.srt
5.1 kB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/05_group-policy.en.txt
5.1 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/05_what-is-going-to-prepare-me-for-practical-system-management.en.txt
5.1 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/02_when-something-goes-wrong.en.txt
5.1 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.srt
5.0 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/01_updating-systems-in-the-enterprise.en.txt
5.0 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/01_don-t-i-just-trust-what-apple-microsoft-and-the-other-guys-tell-me.en.txt
5.0 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/03_securing-users.en.txt
4.9 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/01_why-information-security-in-the-first-place.en.txt
4.8 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/01_what-is-authorization.en.txt
4.8 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/01_what-is-virtualization.en.txt
4.6 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/02_rights-and-permissions.en.txt
4.4 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/03_networking-in-linux.en.txt
4.4 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/02_critical-first-steps/03_integrity.en.txt
4.4 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.srt
4.4 kB
planning-auditing-maintaining-enterprise-systems/04_maintaining-systems-in-the-enterprise/01_maintain/03_baselining-and-assessment.en.txt
4.4 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/02_what-is-personal-computing.en.txt
4.3 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/02_windows-in-the-enterprise.en.txt
4.3 kB
enterprise-system-management-security/03_what-is-virtualization/01_fundamentals-of-virtualization/03_when-to-use-and-not-use-virtualization.en.txt
4.3 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/04_managing-users-on-an-enterprise-level.en.txt
4.2 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/05_sudo.en.txt
4.2 kB
windows-server-management-security/04_securing-windows-in-the-enterprise/01_securing-windows/06_windows-and-encryption.en.txt
4.0 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/02_personal-computing-vs-enterprise-computing/04_what-roles-are-there-in-system-management.en.txt
4.0 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/02_introduction-to-windows/03_windows-server-install.en.txt
3.9 kB
planning-auditing-maintaining-enterprise-systems/02_planning-for-an-enterprise-system-environment/01_plan/03_policies-part-2-technical-policies.en.txt
3.9 kB
planning-auditing-maintaining-enterprise-systems/03_auditing-systems-in-the-enterprise/01_audit/02_splunk.en.txt
3.9 kB
enterprise-system-management-security/01_its-not-that-different-from-my-home-computer-is-it-why-home-computing-doesn-t/01_welcome/04_introduction.en.txt
3.8 kB
windows-server-management-security/02_users-and-authentication-in-a-windows-environment/01_enterprise-user-management/01_windows-logon-process.en.txt
3.7 kB
windows-server-management-security/03_users-and-authorization-in-a-windows-environment/01_users-and-authorization-within-windows/03_access-control.en.txt
3.7 kB
linux-server-management-security/01_introduction-to-practical-linux-system-management/01_welcome/01_introduction.en.txt
3.5 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/08_cron.en.txt
3.4 kB
enterprise-system-management-security/04_isn-t-my-computer-already-protected-good-system-management-starts-with-knowing/01_security/03_what-is-a-secure-computer.en.txt
3.3 kB
linux-server-management-security/03_users-authentication-and-authorization-in-a-linux-environment/01_users-authentication-and-authorization-in-a-linux-environment/01_adding-users.en.txt
3.3 kB
linux-server-management-security/02_configuring-linux-in-the-enterprise/01_configuring-linux-in-the-enterprise/01_enterprise-install-of-centos.en.txt
3.1 kB
windows-server-management-security/01_introduction-to-practical-windows-system-management/01_welcome/01_welcome.en.txt
3.1 kB
planning-auditing-maintaining-enterprise-systems/01_critical-first-steps-in-system-management/01_welcome/01_introduction.en.txt
2.6 kB
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.srt
1.9 kB
planning-auditing-maintaining-enterprise-systems/05_organizational-policies-project/01_final-video/01_congratulations.en.txt
1.2 kB
0. Websites you may like/[CourserHub.com].url
123 Bytes
linux-server-management-security/0. Websites you may like/[CourserHub.com].url
123 Bytes
Readme.txt
51 Bytes
linux-server-management-security/Readme.txt
51 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>