17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Language: English | Size: 679 MB | Duration: 2h 10m
Learn about Cyber Security Attacks and How to Defeat them with Palo Alto Networks Firewalls
What you'll learn
Learn about the Palo Alto Networks firewall security features such as Wildfire , Vulnerability Protection and DNS Security
Understand the methodology and motivations of cybercriminals and attackers.
Understand when, where, and how to use your Palo Alto Networks firewall to protect your network.
Learn how to optimize your Palo Alto Networks Firewall setup and avoid misconfigurations that could lead to a breach.
Requirements
Basic knowledges of Palo Alto Networks firewalls ( 3 months of experience minimum )
Knowledge of Kali Linux is advantageous but not strictly required.
Description
*** The only Palo Alto Networks Firewall course on Udemy 100% Ethical Hacking Oriented .***
Thousand of companies get compromised every year, and unfortunately many of them had no clue they could be the target of a Cyber Attack. Too often, they thought technologies like Firewall & IPS were not necessary in their network and underestimated the risk and damage of a breach.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/01 - Introduction/001 Introduction.mp4
15 MB
~Get Your Files Here !/01 - Introduction/001 Introduction_en.vtt
3.6 KB
~Get Your Files Here !/02 - Security Concepts/001 Anatomy of a Hack.mp4
34.9 MB
~Get Your Files Here !/02 - Security Concepts/001 Anatomy of a Hack_en.vtt
8.5 KB
~Get Your Files Here !/02 - Security Concepts/002 Palo Alto Firewall Security Features.mp4
34.6 MB
~Get Your Files Here !/02 - Security Concepts/002 Palo Alto Firewall Security Features_en.vtt
8.1 KB
~Get Your Files Here !/03 - Reconnaissance and Scanning/001 Scanning the Target.mp4
29.4 MB
~Get Your Files Here !/03 - Reconnaissance and Scanning/001 Scanning the Target_en.vtt
6.4 KB
~Get Your Files Here !/03 - Reconnaissance and Scanning/002 Defend against Scanning.mp4
31.4 MB
~Get Your Files Here !/03 - Reconnaissance and Scanning/002 Defend against Scanning_en.vtt
7 KB
~Get Your Files Here !/03 - Reconnaissance and Scanning/003 Scanning Summary.mp4
11.3 MB
~Get Your Files Here !/03 - Reconnaissance and Scanning/003 Scanning Summary_en.vtt
2.9 KB
~Get Your Files Here !/04 - Enumeration/001 Enumerating the Target.mp4
38.6 MB
~Get Your Files Here !/04 - Enumeration/001 Enumerating the Target_en.vtt
7.7 KB
~Get Your Files Here !/04 - Enumeration/002 Defend against Enumeration.mp4
59.4 MB
~Get Your Files Here !/04 - Enumeration/002 Defend against Enumeration_en.vtt
11.6 KB
~Get Your Files Here !/04 - Enumeration/003 Enumeration Summary.mp4
14.1 MB
~Get Your Files Here !/04 - Enumeration/003 Enumeration Summary_en.vtt
3.1 KB
~Get Your Files Here !/05 - Exploitation and Delivery/001 Exploiting the Target.mp4
33.9 MB
~Get Your Files Here !/05 - Exploitation and Delivery/001 Exploiting the Target_en.vtt
8.7 KB
~Get Your Files Here !/05 - Exploitation and Delivery/002 Defend against Exploitation and Delivery.mp4
64.2 MB
~Get Your Files Here !/05 - Exploitation and Delivery/002 Defend against Exploitation and Delivery_en.vtt
13.5 KB
~Get Your Files Here !/05 - Exploitation and Delivery/003 Exploitation & Delivery Summary.mp4
11.3 MB
~Get Your Files Here !/05 - Exploitation and Delivery/003 Exploitation & Delivery Summary_en.vtt
2.7 KB
~Get Your Files Here !/06 - Data Exfiltration/001 Data Exfiltration.mp4
35.6 MB
~Get Your Files Here !/06 - Data Exfiltration/001 Data Exfiltration_en.vtt
8 KB
~Get Your Files Here !/06 - Data Exfiltration/002 Defend against Data Exfiltration.mp4
50.6 MB
~Get Your Files Here !/06 - Data Exfiltration/002 Defend against Data Exfiltration_en.vtt
10.5 KB
~Get Your Files Here !/06 - Data Exfiltration/003 Data Exfiltration Summary.mp4
9.7 MB
~Get Your Files Here !/06 - Data Exfiltration/003 Data Exfiltration Summary_en.vtt
2.4 KB
~Get Your Files Here !/07 - Lateral Movements/001 Lateral Movements.mp4
26.1 MB
~Get Your Files Here !/07 - Lateral Movements/001 Lateral Movements_en.vtt
5.3 KB
~Get Your Files Here !/07 - Lateral Movements/002 Defend against Lateral Movements.mp4
52.6 MB
~Get Your Files Here !/07 - Lateral Movements/002 Defend against Lateral Movements_en.vtt
10.7 KB
~Get Your Files Here !/07 - Lateral Movements/003 Lateral Movements Summary.mp4
14.3 MB
~Get Your Files Here !/07 - Lateral Movements/003 Lateral Movements Summary_en.vtt
3.5 KB
~Get Your Files Here !/08 - Command and Control/001 Command and Control.mp4
47 MB
~Get Your Files Here !/08 - Command and Control/001 Command and Control_en.vtt
8.4 KB
~Get Your Files Here !/08 - Command and Control/002 Defend against Command and Control.mp4
48.1 MB
~Get Your Files Here !/08 - Command and Control/002 Defend against Command and Control_en.vtt
10.4 KB
~Get Your Files Here !/08 - Command and Control/003 Command and Control Summary.mp4
13.7 MB
~Get Your Files Here !/08 - Command and Control/003 Command and Control Summary_en.vtt
3.1 KB
~Get Your Files Here !/09 - Bonus Section/001 Bonus lecture.mp4
3.1 MB
~Get Your Files Here !/09 - Bonus Section/001 Bonus lecture_en.vtt
589 B
~Get Your Files Here !/09 - Bonus Section/001 training-links.txt