Cvika
1. Practical example of the substitution and transportation ciphers.pdf
10. Firewall Configuration - Basic rules, Advanced configuration, Address translation options.pdf
11. Bodovan cviko - Practical work with Linux firewall using Iptables or Nft, Sandboxing with GNS3.pdf
12. Examples of Data Capture Capabilities with MiTM and VOIP Audio stream analysis, VoIP social attack.pdf
2. Scanning and monitoring the security threats, finding potentical security vulnerabilities using specific tools.pdf
3. OpenSSL, createCAs, generating and signing keys.pdf
3.1 Nvod s pkazy.pdf
4. Bodovan loha - Security libraries, Creating certification Authority, Generating and Signing keys.pdf
5. Secure Data Transfer with SCP, Generation of SSH Certificates, Putty tunneling.pdf
6. Creating VPN and Connection using OpenVPN and WireGuard.pdf
6.1 Guide - OpenVPN and WireGuide.pdf
7. Bodovn loha - Implementation of the VPN Tunnel using Open-source tools and apps.pdf
8. Security in 802.11 Networks, NetSpot and Kismet.pdf
9. Intrusion Detecton and Protection systems - Config, Rules settings, Logging.pdf