У нас вы можете посмотреть бесплатно DNSSEC Class - 1/10 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This is the first webinar in the series, and covers the threats to DNS, discussing which of these DNSSEC addresses, and which it does not address. Note that these were recorded when BIND 9.14 was the current version, and since then, ISC has implemented a new dnssec-policy tool in BIND that will automate signature and key maintenance. The fundamentals of how DNSSEC works, however, have not changed. This series of 10 lectures will take you through a full-day class on DNSSEC theory, history, implementation and troubleshooting, using BIND. 1 - DNS Threats, need for DNSSEC 2 - History of DNSSEC Development & Deployment 3 - Cryptography and DNS background for DNSSEC 4 - DNSSEC Resolution and Validation 5 - DNSSEC Record Types, Keys, signatures and NSEC records 6 - DNSSEC Record Types, Keys, signatures and NSEC records, pt 2 7 - DNSSEC signing with BIND 8 - Key rollover & Algorithm rollover 9 - Key maintenance 10 - DNSSEC troubleshooting You are welcome to post your questions about BIND 9 DNS on our helpful community mailing list at https://lists.isc.org/mailman/listinf.... The BIND Administrative Reference Manual is online at https://bind9.readthedocs.io/en/stable/. We also maintain a knowledgebase of handy technical articles at https://kb.isc.org. Internet Systems Consortium maintains and publishes the BIND 9 DNS software under the open source MPL 2.0 license. ISC is a non-profit, operating to help support the Internet infrastructure and facilitate independent connection to and participation in the Internet. We support this work by offering users professional technical support contracts, including advance notification of security vulnerabilities before public disclosure. --- Learn more at https://www.isc.org