Create Tool:
Create Time:1970-01-01 08:00:00
File Size:1806.11 MB
File Count:290
File Hash:8cd7292c3c32d939d4945d6ae48439e20719ef65
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 | 70.87 MB |
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 Introduction.mp4 | 18.61 MB |
Module 1 Cybersecurity Fundamentals/001. Module introduction en.srt | 502 B |
Module 1 Cybersecurity Fundamentals/001. Module introduction.mp4 | 1.83 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/001. Learning objectives en.srt | 2.02 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/001. Learning objectives.mp4 | 10.04 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits en.srt | 21.68 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 | 41.96 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/003. 1.2 Keyloggers and Spyware en.srt | 4.41 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/003. 1.2 Keyloggers and Spyware.mp4 | 7.39 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/004. 1.3 Malware Analysis Techniques en.srt | 5.41 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/004. 1.3 Malware Analysis Techniques.mp4 | 11.47 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.mp4 | 12.06 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.srt | 5.04 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/006. 1.5 Surveying Common Application-based Vulnerabilities en.srt | 8.64 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/006. 1.5 Surveying Common Application-based Vulnerabilities.mp4 | 32.64 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.mp4 | 26.00 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.srt | 11.49 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities en.srt | 28.85 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 | 59.27 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities en.srt | 30.30 KB |
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 Introduction en.srt | 4.61 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/010. 1.9 Understanding Buffer Overflows en.srt | 8.70 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/010. 1.9 Understanding Buffer Overflows.mp4 | 20.08 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/011. 1.10 Surveying Unsecure Code Practices and Insecure APIs en.srt | 5.81 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/011. 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 | 11.40 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/012. 1.11 Understanding Security Threats in Cloud Environments en.srt | 11.76 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/012. 1.11 Understanding Security Threats in Cloud Environments.mp4 | 21.57 MB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/013. 1.12 Understanding IoT Security Threats en.srt | 14.19 KB |
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/013. 1.12 Understanding IoT Security Threats.mp4 | 37.32 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/001. Learning objectives en.srt | 886 B |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/001. Learning objectives.mp4 | 4.26 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/002. 2.1 Introducing Cryptography and Cryptanalysis en.srt | 2.56 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/002. 2.1 Introducing Cryptography and Cryptanalysis.mp4 | 5.43 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/003. 2.2 Understanding Encryption Protocols en.srt | 7.63 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/003. 2.2 Understanding Encryption Protocols.mp4 | 13.56 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/004. 2.3 Describing Hashing Algorithms en.srt | 5.78 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/004. 2.3 Describing Hashing Algorithms.mp4 | 11.30 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/005. 2.4 Introducing Public Key Infrastructure (PKI) en.srt | 7.92 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/005. 2.4 Introducing Public Key Infrastructure (PKI).mp4 | 16.74 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment en.srt | 6.61 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 | 14.99 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/007. 2.6 Surveying SSL and TLS Implementations en.srt | 6.35 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/007. 2.6 Surveying SSL and TLS Implementations.mp4 | 13.73 MB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/008. 2.7 Surveying IPsec Implementations en.srt | 20.66 KB |
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/008. 2.7 Surveying IPsec Implementations.mp4 | 41.70 MB |
Module 2 Software-Defined Networking Security and Network Programmability/001. Module introduction en.srt | 526 B |
Module 2 Software-Defined Networking Security and Network Programmability/001. Module introduction.mp4 | 2.05 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/001. Learning objectives en.srt | 970 B |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/001. Learning objectives.mp4 | 5.38 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/002. 3.1 Introducing SDN en.srt | 6.90 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/002. 3.1 Introducing SDN.mp4 | 13.80 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt | 3.64 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 | 9.64 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/004. 3.3 Introducing Cisco ACI en.srt | 9.86 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/004. 3.3 Introducing Cisco ACI.mp4 | 17.68 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/005. 3.4 Introducing Cisco DNA and Cisco DNA Center en.srt | 10.64 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/005. 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 | 28.97 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/006. 3.5 Understanding VXLAN and Network Overlays en.srt | 4.52 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/006. 3.5 Understanding VXLAN and Network Overlays.mp4 | 9.92 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/007. 3.6 Understanding Microsegmentation en.srt | 6.11 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/007. 3.6 Understanding Microsegmentation.mp4 | 9.23 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/008. 3.7 Surveying Open Source SDN Solutions en.srt | 5.10 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/008. 3.7 Surveying Open Source SDN Solutions.mp4 | 10.03 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/009. 3.8 Understanding the Threats Against SDN Solutions en.srt | 3.49 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/009. 3.8 Understanding the Threats Against SDN Solutions.mp4 | 7.36 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/010. 3.9 Understanding the Security Benefits in SDN Solutions en.srt | 2.82 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/010. 3.9 Understanding the Security Benefits in SDN Solutions.mp4 | 6.73 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/001. Learning objectives en.srt | 1.22 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/001. Learning objectives.mp4 | 6.70 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/002. 4.1 Introducing Network Programmability en.srt | 13.35 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/002. 4.1 Introducing Network Programmability.mp4 | 31.25 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/003. 4.2 Exploring DevNet and DevNet Resources for Security Automation en.srt | 1.61 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/003. 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 | 3.80 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt | 16.87 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 | 37.47 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/005. 4.4 A Brief Introduction to Git en.srt | 10.13 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/005. 4.4 A Brief Introduction to Git.mp4 | 25.27 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/006. 4.5 Exploring pxGrid en.srt | 7.29 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/006. 4.5 Exploring pxGrid.mp4 | 15.73 MB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/007. 4.6 Integrating and Automating Security Operations with Cisco Products en.srt | 5.05 KB |
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/007. 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 | 11.29 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/001. Module introduction en.srt | 629 B |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/001. Module introduction.mp4 | 2.27 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/001. Learning objectives en.srt | 1.34 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/001. Learning objectives.mp4 | 4.77 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/002. 5.1 Understanding Authentication en.srt | 17.51 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/002. 5.1 Understanding Authentication.mp4 | 30.03 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/003. 5.2 Exploring the RADIUS Protocol en.srt | 5.15 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/003. 5.2 Exploring the RADIUS Protocol.mp4 | 10.29 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/004. 5.3 Surveying the TACACS+ Protocol en.srt | 3.32 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/004. 5.3 Surveying the TACACS+ Protocol.mp4 | 7.09 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/005. 5.4 Understanding Authorization en.srt | 3.38 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/005. 5.4 Understanding Authorization.mp4 | 7.36 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/006. 5.5 Surveying Authorization Models en.srt | 6.49 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/006. 5.5 Surveying Authorization Models.mp4 | 14.79 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/007. 5.6 Defining Accounting en.srt | 2.66 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/007. 5.6 Defining Accounting.mp4 | 5.96 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/008. 5.7 Exploring Multifactor Authentication and Single Sign-On en.srt | 8.91 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/008. 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 | 24.59 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/009. 5.8 Exploring Examples of Multifactor and Single Sign-On en.srt | 2.38 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/009. 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 | 6.79 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/010. 5.9 Understanding Cisco DUO en.srt | 6.53 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/010. 5.9 Understanding Cisco DUO.mp4 | 11.93 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/011. 5.10 Introducing Cisco ISE en.srt | 4.75 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/011. 5.10 Introducing Cisco ISE.mp4 | 11.29 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/012. 5.11 Understanding Cisco ISE Profiling Services en.srt | 4.35 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/012. 5.11 Understanding Cisco ISE Profiling Services.mp4 | 7.52 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/013. 5.12 Understanding ISE Identity Services en.srt | 5.90 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/013. 5.12 Understanding ISE Identity Services.mp4 | 11.73 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/014. 5.13 Describing ISE Authorization Rules en.srt | 3.62 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/014. 5.13 Describing ISE Authorization Rules.mp4 | 8.39 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/001. Learning objectives en.srt | 2.23 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/001. Learning objectives.mp4 | 7.88 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/002. 6.1 Defining Network Visibility and Segmentation en.srt | 3.25 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/002. 6.1 Defining Network Visibility and Segmentation.mp4 | 6.19 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/003. 6.2 Introducing NetFlow and IPFIX en.srt | 3.43 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/003. 6.2 Introducing NetFlow and IPFIX.mp4 | 6.60 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/004. 6.3 Describing Flexible NetFlow Records en.srt | 5.55 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/004. 6.3 Describing Flexible NetFlow Records.mp4 | 11.19 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/005. 6.4 Understanding NetFlow Deployment en.srt | 3.95 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/005. 6.4 Understanding NetFlow Deployment.mp4 | 10.54 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/006. 6.5 Exploring Cisco Stealthwatch en.srt | 2.82 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/006. 6.5 Exploring Cisco Stealthwatch.mp4 | 5.04 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/007. 6.6 Deploying Cisco Stealthwatch Cloud en.srt | 4.36 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/007. 6.6 Deploying Cisco Stealthwatch Cloud.mp4 | 8.61 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/008. 6.7 On-Premise Monitoring with Stealthwatch Cloud en.srt | 1.18 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/008. 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 | 2.57 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/009. 6.8 Exploring the Cisco TrustSec Solution en.srt | 4.47 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/009. 6.8 Exploring the Cisco TrustSec Solution.mp4 | 9.99 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/010. 6.9 Describing the Benefits of Device Compliance and Application Control en.srt | 2.94 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/010. 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 | 5.57 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/011. 6.10 Introducing Network Segmentation en.srt | 2.85 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/011. 6.10 Introducing Network Segmentation.mp4 | 5.31 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/012. 6.11 Exploring Application-based Segmentation en.srt | 2.97 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/012. 6.11 Exploring Application-based Segmentation.mp4 | 5.82 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/013. 6.12 Understanding Cisco ACI en.srt | 3.63 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/013. 6.12 Understanding Cisco ACI.mp4 | 7.64 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/014. 6.13 Describing Network Access with CoA en.srt | 2.36 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/014. 6.13 Describing Network Access with CoA.mp4 | 4.96 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/015. 6.14 Integrating Different Security Systems Using pxGrid en.srt | 4.22 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/015. 6.14 Integrating Different Security Systems Using pxGrid.mp4 | 9.92 MB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr en.srt | 9.39 KB |
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr.mp4 | 18.02 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/001. Module introduction en.srt | 673 B |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/001. Module introduction.mp4 | 2.46 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/001. Learning objectives en.srt | 1.31 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/001. Learning objectives.mp4 | 4.74 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt | 7.10 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 | 12.92 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/003. 7.2 Configuring and Verifying Port Security en.srt | 5.18 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/003. 7.2 Configuring and Verifying Port Security.mp4 | 11.89 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/004. 7.3 Configuring and Verifying DHCP Snooping en.srt | 3.94 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/004. 7.3 Configuring and Verifying DHCP Snooping.mp4 | 11.32 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/005. 7.4 Configuring and Verifying Dynamic ARP Inspection en.srt | 7.23 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/005. 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 | 15.58 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/006. 7.5 Exploring and Mitigating Common Layer 2 Threats en.srt | 6.25 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/006. 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 | 15.54 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/007. 7.6 Understanding and Configuring BPDU Guard and Root Guard en.srt | 3.19 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/007. 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 | 6.70 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/008. 7.7 Understanding and Configuring CDPLLDP en.srt | 3.46 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/008. 7.7 Understanding and Configuring CDPLLDP.mp4 | 8.96 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt | 8.33 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 | 15.08 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/010. 7.9 Exploring How to Secure the Management Plane en.srt | 7.23 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/010. 7.9 Exploring How to Secure the Management Plane.mp4 | 14.22 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/011. 7.10 Exploring How to Secure the Control Plane en.srt | 8.10 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/011. 7.10 Exploring How to Secure the Control Plane.mp4 | 15.02 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/012. 7.11 Exploring How to Secure the Data Plane en.srt | 6.09 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/012. 7.11 Exploring How to Secure the Data Plane.mp4 | 11.74 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/001. Learning objectives en.srt | 1.76 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/001. Learning objectives.mp4 | 6.22 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/002. 8.1 Introducing Cisco Next-Generation Firewalls en.srt | 10.40 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/002. 8.1 Introducing Cisco Next-Generation Firewalls.mp4 | 17.87 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/003. 8.2 Surveying the Cisco Firepower Management Center (FMC) en.srt | 18.10 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/003. 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 | 44.31 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/004. 8.3 Exploring the Cisco Firepower Device Manager (FDM) en.srt | 11.08 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/004. 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 | 23.97 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/005. 8.4 Implementing Access Control Policies en.srt | 5.55 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/005. 8.4 Implementing Access Control Policies.mp4 | 7.79 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/001. Learning objectives en.srt | 787 B |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/001. Learning objectives.mp4 | 2.58 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems en.srt | 7.90 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 | 28.68 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven en.srt | 2.37 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven.mp4 | 8.32 MB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems en.srt | 6.48 KB |
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 | 11.89 MB |
Module 5 Virtual Private Networks (VPNs)/001. Module introduction en.srt | 411 B |
Module 5 Virtual Private Networks (VPNs)/001. Module introduction.mp4 | 1.68 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/001. Learning objectives en.srt | 729 B |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/001. Learning objectives.mp4 | 3.76 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs en.srt | 11.02 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 | 18.11 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/003. 10.2 Configuring IPsec Site-to-site VPNs en.srt | 3.78 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/003. 10.2 Configuring IPsec Site-to-site VPNs.mp4 | 5.59 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers en.srt | 5.23 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 | 9.94 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/005. 10.4 Exploring DMVPN en.srt | 10.97 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/005. 10.4 Exploring DMVPN.mp4 | 19.60 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/006. 10.5 Understanding GET VPN en.srt | 8.36 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/006. 10.5 Understanding GET VPN.mp4 | 15.68 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/007. 10.6 Deploying FlexVPN en.srt | 9.59 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/007. 10.6 Deploying FlexVPN.mp4 | 19.52 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/008. 10.7 Troubleshooting Site-to-site VPN Implementations en.srt | 7.88 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/008. 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 | 13.43 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/001. Learning objectives en.srt | 904 B |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/001. Learning objectives.mp4 | 4.34 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/002. 11.1 Introducing Remote Access VPNs en.srt | 1.97 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/002. 11.1 Introducing Remote Access VPNs.mp4 | 3.70 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/003. 11.2 Exploring Clientless Remote Access VPNs en.srt | 6.90 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/003. 11.2 Exploring Clientless Remote Access VPNs.mp4 | 12.47 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client en.srt | 4.26 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 | 9.34 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD en.srt | 5.11 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 | 11.97 MB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/006. 11.5 Troubleshooting Remote Access VPN Implementations en.srt | 2.32 KB |
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/006. 11.5 Troubleshooting Remote Access VPN Implementations.mp4 | 4.68 MB |
Module 6 Securing the Cloud and Content Security/001. Module introduction en.srt | 772 B |
Module 6 Securing the Cloud and Content Security/001. Module introduction.mp4 | 2.50 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/001. Learning objectives en.srt | 1.28 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/001. Learning objectives.mp4 | 6.61 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/002. 12.1 Introducing the Different Cloud Deployment and Service Models en.srt | 5.61 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/002. 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 | 11.39 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/003. 12.2 Surveying Patch Management in the Cloud en.srt | 4.88 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/003. 12.2 Surveying Patch Management in the Cloud.mp4 | 8.26 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/004. 12.3 Performing Security Assessments in Cloud Environments en.srt | 4.63 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/004. 12.3 Performing Security Assessments in Cloud Environments.mp4 | 11.58 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/005. 12.4 Introducing Agile, DevOps, and CICD Pipelines en.srt | 12.62 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/005. 12.4 Introducing Agile, DevOps, and CICD Pipelines.mp4 | 22.05 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/006. 12.5 Introducing Serverless Computing en.srt | 1.86 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/006. 12.5 Introducing Serverless Computing.mp4 | 3.68 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes en.srt | 2.42 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 | 5.61 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/008. 12.7 Exploring the Concepts of DevSecOps en.srt | 6.26 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/008. 12.7 Exploring the Concepts of DevSecOps.mp4 | 12.64 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/009. 12.8 Surveying Cisco Umbrella en.srt | 7.83 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/009. 12.8 Surveying Cisco Umbrella.mp4 | 15.75 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/010. 12.9 Exploring Cisco Cloud Email Security en.srt | 3.23 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/010. 12.9 Exploring Cisco Cloud Email Security.mp4 | 5.21 MB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/011. 12.10 Exploring Cisco Cloudlock en.srt | 6.91 KB |
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/011. 12.10 Exploring Cisco Cloudlock.mp4 | 13.50 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/001. Learning objectives en.srt | 1.68 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/001. Learning objectives.mp4 | 5.55 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/002. 13.1 Introducing Cisco Content Security Solutions en.srt | 4.23 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/002. 13.1 Introducing Cisco Content Security Solutions.mp4 | 10.14 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification en.srt | 3.83 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 | 8.25 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/004. 13.3 Introduction to Cisco Email Security en.srt | 4.31 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/004. 13.3 Introduction to Cisco Email Security.mp4 | 13.00 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/005. 13.4 Exploring the Cisco ESA Deployment Model en.srt | 2.79 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/005. 13.4 Exploring the Cisco ESA Deployment Model.mp4 | 5.19 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/006. 13.5 Understanding Email Security Features en.srt | 4.66 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/006. 13.5 Understanding Email Security Features.mp4 | 9.48 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/007. 13.6 Discussing Email Security in the Cloud en.srt | 4.68 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/007. 13.6 Discussing Email Security in the Cloud.mp4 | 9.18 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/008. 13.7 Introduction to Secure Internet Gateway (SIG) en.srt | 3.50 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/008. 13.7 Introduction to Secure Internet Gateway (SIG).mp4 | 6.65 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella en.srt | 3.55 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 | 10.13 MB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/010. 13.9 Exploring Cisco Umbrella Investigate en.srt | 4.75 KB |
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/010. 13.9 Exploring Cisco Umbrella Investigate.mp4 | 10.65 MB |
Module 7 Endpoint Security and Cisco Threat Response/001. Module introduction en.srt | 354 B |
Module 7 Endpoint Security and Cisco Threat Response/001. Module introduction.mp4 | 1.46 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/001. Learning objectives en.srt | 2.03 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/001. Learning objectives.mp4 | 6.87 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/002. 14.1 Introducing AMP for Endpoints en.srt | 3.73 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/002. 14.1 Introducing AMP for Endpoints.mp4 | 7.53 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/003. 14.2 Describing AMP for Endpoints Outbreak Control en.srt | 8.64 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/003. 14.2 Describing AMP for Endpoints Outbreak Control.mp4 | 16.13 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions en.srt | 3.24 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 | 7.29 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/005. 14.4 Understanding AMP IP Blacklists and Whitelists en.srt | 3.73 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/005. 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 | 7.09 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/006. 14.5 Exploring Application Control in AMP for Endpoints en.srt | 1.78 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/006. 14.5 Exploring Application Control in AMP for Endpoints.mp4 | 3.94 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/007. 14.6 Describing AMP for Endpoints Exclusion Sets en.srt | 5.94 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/007. 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 | 11.41 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/008. 14.7 Introduction to AMP for Endpoints Policies en.srt | 1.17 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/008. 14.7 Introduction to AMP for Endpoints Policies.mp4 | 1.95 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/009. 14.8 Describing the Anyconnect AMP Enabler en.srt | 633 B |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/009. 14.8 Describing the Anyconnect AMP Enabler.mp4 | 1.14 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/010. 14.9 Exploring AMP for Endpoints Engines en.srt | 1.99 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/010. 14.9 Exploring AMP for Endpoints Engines.mp4 | 3.30 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/011. 14.10 How to Utilize AMP for Endpoints Reporting Features en.srt | 5.04 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/011. 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 | 9.06 MB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/012. 14.11 Introducing the Cisco Threat Response Solution en.srt | 3.42 KB |
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/012. 14.11 Introducing the Cisco Threat Response Solution.mp4 | 11.14 MB |
Summary/001. CCNP and CCIE Security Core SCOR 350-701 Summary en.srt | 2.28 KB |
Summary/001. CCNP and CCIE Security Core SCOR 350-701 Summary.mp4 | 11.21 MB |
http://bt3.t-ru.org/ann?magnet |
TorrentBank
Copyright © 2024