 Cvika
Cvika
 1. Practical example of the substitution and transportation ciphers.pdf
1. Practical example of the substitution and transportation ciphers.pdf
 10. Firewall Configuration - Basic rules, Advanced configuration, Address translation options.pdf
10. Firewall Configuration - Basic rules, Advanced configuration, Address translation options.pdf
 11. Bodovan cviko - Practical work with Linux firewall using Iptables or Nft, Sandboxing with GNS3.pdf
11. Bodovan cviko - Practical work with Linux firewall using Iptables or Nft, Sandboxing with GNS3.pdf
 12. Examples of Data Capture Capabilities with MiTM and VOIP Audio stream analysis, VoIP social attack.pdf
12. Examples of Data Capture Capabilities with MiTM and VOIP Audio stream analysis, VoIP social attack.pdf
 2. Scanning and monitoring the security threats, finding potentical security vulnerabilities using specific tools.pdf
2. Scanning and monitoring the security threats, finding potentical security vulnerabilities using specific tools.pdf
 3. OpenSSL, createCAs, generating and signing keys.pdf
3. OpenSSL, createCAs, generating and signing keys.pdf
 3.1 Nvod s pkazy.pdf
3.1 Nvod s pkazy.pdf
 4. Bodovan loha - Security libraries, Creating certification Authority, Generating and Signing keys.pdf
4. Bodovan loha - Security libraries, Creating certification Authority, Generating and Signing keys.pdf
 5. Secure Data Transfer with SCP, Generation of SSH Certificates, Putty tunneling.pdf
5. Secure Data Transfer with SCP, Generation of SSH Certificates, Putty tunneling.pdf
 6. Creating VPN and Connection using OpenVPN and WireGuard.pdf
6. Creating VPN and Connection using OpenVPN and WireGuard.pdf
 6.1 Guide - OpenVPN and WireGuide.pdf
6.1 Guide - OpenVPN and WireGuide.pdf
 7. Bodovn loha - Implementation of the VPN Tunnel using Open-source tools and apps.pdf
7. Bodovn loha - Implementation of the VPN Tunnel using Open-source tools and apps.pdf
 8. Security in 802.11 Networks, NetSpot and Kismet.pdf
8. Security in 802.11 Networks, NetSpot and Kismet.pdf
 9. Intrusion Detecton and Protection systems - Config, Rules settings, Logging.pdf
9. Intrusion Detecton and Protection systems - Config, Rules settings, Logging.pdf