Become a Cyber Security Specialist by learning Computer Networks Security Technologies and Tools for Network Security Architects and Cyber Security Officers.
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 1100 Students Enrolled
- 01:13 Hours
Course Overview
A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.If you’re using a proxy server, internet traffic flows through the proxy server on its way to the address you requested. The request then comes back through that same proxy server (there are exceptions to this rule), and then the proxy server forwards the data received from the website to you.
Who this course is for:
- Network administrators
- Cyber security officers
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers - Security
- Web Developers - Security
- Mobile Applications Developers - Security
What you'll learn
- Introduction to Explicit proxy
- Web cache
- Explicit web proxy configuration
- Introduction Antivirus and Conserve Mode
- Types of antivirus databases
- Memory conserve mode
Course Curriculum
-
Introduction to Explic... 00:02:10
-
Introduction to Explicit proxy 00:02:10
-
What is an explict web... 00:10:21
-
What is an explict web proxy 00:10:21
-
PAC file vs. web proxy... 00:04:39
-
Web cache 00:02:06
-
Web cache 00:02:06
-
IP based vs Session ba... 00:01:34
-
Explicit web proxy con... 00:08:49
-
Explicit web proxy configuration 00:08:49
-
Explicit proxy address... 00:07:19
-
Explicit proxy addresses 00:07:19
-
Monitoring Explicit pr... 00:01:32
-
Monitoring Explicit proxy users 00:01:32
-
Introduction Antivirus... 00:04:50
-
Types of Malware 00:04:03
-
Types of Malware 00:04:03
-
Heuristic, grayware an... 00:05:12
-
Types of antivirus dat... 00:02:02
-
Types of antivirus databases 00:02:02
-
Sandboxing 00:01:54
-
Sandboxing 00:01:54
-
Proxybased vs Flowbase... 00:07:48
-
Proxybased vs Flowbased scans 00:07:48
-
Scan encrypted traffic... 00:07:08
-
Memory conserve mode 00:01:56
-
Memory conserve mode 00:01:56
Item Reviews - 0
Submit Reviews
This Course Include:
- 01:13 Hours On-Demand Videos
- 16 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion