CCNP and CCIE Security Core SCOR 350-701 - TorrentBank

File Name:CCNP and CCIE Security Core SCOR 350-701

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:1806.11 MB

File Count:290

File Hash:8cd7292c3c32d939d4945d6ae48439e20719ef65

Magnet Link:

Magnet Link:

Torrent File:

Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 70.87 MB
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 Introduction.mp4 18.61 MB
Module 1 Cybersecurity Fundamentals/001. Module introduction en.srt 502 B
Module 1 Cybersecurity Fundamentals/001. Module introduction.mp4 1.83 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/001. Learning objectives en.srt 2.02 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/001. Learning objectives.mp4 10.04 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits en.srt 21.68 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 41.96 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/003. 1.2 Keyloggers and Spyware en.srt 4.41 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/003. 1.2 Keyloggers and Spyware.mp4 7.39 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/004. 1.3 Malware Analysis Techniques en.srt 5.41 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/004. 1.3 Malware Analysis Techniques.mp4 11.47 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.mp4 12.06 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.srt 5.04 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/006. 1.5 Surveying Common Application-based Vulnerabilities en.srt 8.64 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/006. 1.5 Surveying Common Application-based Vulnerabilities.mp4 32.64 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.mp4 26.00 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.srt 11.49 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities en.srt 28.85 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 59.27 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities en.srt 30.30 KB
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 Introduction en.srt 4.61 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/010. 1.9 Understanding Buffer Overflows en.srt 8.70 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/010. 1.9 Understanding Buffer Overflows.mp4 20.08 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/011. 1.10 Surveying Unsecure Code Practices and Insecure APIs en.srt 5.81 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/011. 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 11.40 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/012. 1.11 Understanding Security Threats in Cloud Environments en.srt 11.76 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/012. 1.11 Understanding Security Threats in Cloud Environments.mp4 21.57 MB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/013. 1.12 Understanding IoT Security Threats en.srt 14.19 KB
Module 1 Cybersecurity Fundamentals/Lesson 1 Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments/013. 1.12 Understanding IoT Security Threats.mp4 37.32 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/001. Learning objectives en.srt 886 B
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/001. Learning objectives.mp4 4.26 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/002. 2.1 Introducing Cryptography and Cryptanalysis en.srt 2.56 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/002. 2.1 Introducing Cryptography and Cryptanalysis.mp4 5.43 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/003. 2.2 Understanding Encryption Protocols en.srt 7.63 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/003. 2.2 Understanding Encryption Protocols.mp4 13.56 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/004. 2.3 Describing Hashing Algorithms en.srt 5.78 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/004. 2.3 Describing Hashing Algorithms.mp4 11.30 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/005. 2.4 Introducing Public Key Infrastructure (PKI) en.srt 7.92 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/005. 2.4 Introducing Public Key Infrastructure (PKI).mp4 16.74 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment en.srt 6.61 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 14.99 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/007. 2.6 Surveying SSL and TLS Implementations en.srt 6.35 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/007. 2.6 Surveying SSL and TLS Implementations.mp4 13.73 MB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/008. 2.7 Surveying IPsec Implementations en.srt 20.66 KB
Module 1 Cybersecurity Fundamentals/Lesson 2 Cryptography/008. 2.7 Surveying IPsec Implementations.mp4 41.70 MB
Module 2 Software-Defined Networking Security and Network Programmability/001. Module introduction en.srt 526 B
Module 2 Software-Defined Networking Security and Network Programmability/001. Module introduction.mp4 2.05 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/001. Learning objectives en.srt 970 B
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/001. Learning objectives.mp4 5.38 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/002. 3.1 Introducing SDN en.srt 6.90 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/002. 3.1 Introducing SDN.mp4 13.80 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt 3.64 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 9.64 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/004. 3.3 Introducing Cisco ACI en.srt 9.86 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/004. 3.3 Introducing Cisco ACI.mp4 17.68 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/005. 3.4 Introducing Cisco DNA and Cisco DNA Center en.srt 10.64 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/005. 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 28.97 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/006. 3.5 Understanding VXLAN and Network Overlays en.srt 4.52 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/006. 3.5 Understanding VXLAN and Network Overlays.mp4 9.92 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/007. 3.6 Understanding Microsegmentation en.srt 6.11 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/007. 3.6 Understanding Microsegmentation.mp4 9.23 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/008. 3.7 Surveying Open Source SDN Solutions en.srt 5.10 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/008. 3.7 Surveying Open Source SDN Solutions.mp4 10.03 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/009. 3.8 Understanding the Threats Against SDN Solutions en.srt 3.49 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/009. 3.8 Understanding the Threats Against SDN Solutions.mp4 7.36 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/010. 3.9 Understanding the Security Benefits in SDN Solutions en.srt 2.82 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 3 Software-Defined Networking Security/010. 3.9 Understanding the Security Benefits in SDN Solutions.mp4 6.73 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/001. Learning objectives en.srt 1.22 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/001. Learning objectives.mp4 6.70 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/002. 4.1 Introducing Network Programmability en.srt 13.35 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/002. 4.1 Introducing Network Programmability.mp4 31.25 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/003. 4.2 Exploring DevNet and DevNet Resources for Security Automation en.srt 1.61 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/003. 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 3.80 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt 16.87 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 37.47 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/005. 4.4 A Brief Introduction to Git en.srt 10.13 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/005. 4.4 A Brief Introduction to Git.mp4 25.27 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/006. 4.5 Exploring pxGrid en.srt 7.29 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/006. 4.5 Exploring pxGrid.mp4 15.73 MB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/007. 4.6 Integrating and Automating Security Operations with Cisco Products en.srt 5.05 KB
Module 2 Software-Defined Networking Security and Network Programmability/Lesson 4 Network Programmability/007. 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 11.29 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/001. Module introduction en.srt 629 B
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/001. Module introduction.mp4 2.27 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/001. Learning objectives en.srt 1.34 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/001. Learning objectives.mp4 4.77 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/002. 5.1 Understanding Authentication en.srt 17.51 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/002. 5.1 Understanding Authentication.mp4 30.03 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/003. 5.2 Exploring the RADIUS Protocol en.srt 5.15 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/003. 5.2 Exploring the RADIUS Protocol.mp4 10.29 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/004. 5.3 Surveying the TACACS+ Protocol en.srt 3.32 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/004. 5.3 Surveying the TACACS+ Protocol.mp4 7.09 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/005. 5.4 Understanding Authorization en.srt 3.38 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/005. 5.4 Understanding Authorization.mp4 7.36 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/006. 5.5 Surveying Authorization Models en.srt 6.49 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/006. 5.5 Surveying Authorization Models.mp4 14.79 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/007. 5.6 Defining Accounting en.srt 2.66 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/007. 5.6 Defining Accounting.mp4 5.96 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/008. 5.7 Exploring Multifactor Authentication and Single Sign-On en.srt 8.91 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/008. 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 24.59 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/009. 5.8 Exploring Examples of Multifactor and Single Sign-On en.srt 2.38 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/009. 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 6.79 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/010. 5.9 Understanding Cisco DUO en.srt 6.53 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/010. 5.9 Understanding Cisco DUO.mp4 11.93 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/011. 5.10 Introducing Cisco ISE en.srt 4.75 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/011. 5.10 Introducing Cisco ISE.mp4 11.29 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/012. 5.11 Understanding Cisco ISE Profiling Services en.srt 4.35 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/012. 5.11 Understanding Cisco ISE Profiling Services.mp4 7.52 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/013. 5.12 Understanding ISE Identity Services en.srt 5.90 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/013. 5.12 Understanding ISE Identity Services.mp4 11.73 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/014. 5.13 Describing ISE Authorization Rules en.srt 3.62 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 5 Introducing AAA and Identity Management/014. 5.13 Describing ISE Authorization Rules.mp4 8.39 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/001. Learning objectives en.srt 2.23 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/001. Learning objectives.mp4 7.88 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/002. 6.1 Defining Network Visibility and Segmentation en.srt 3.25 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/002. 6.1 Defining Network Visibility and Segmentation.mp4 6.19 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/003. 6.2 Introducing NetFlow and IPFIX en.srt 3.43 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/003. 6.2 Introducing NetFlow and IPFIX.mp4 6.60 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/004. 6.3 Describing Flexible NetFlow Records en.srt 5.55 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/004. 6.3 Describing Flexible NetFlow Records.mp4 11.19 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/005. 6.4 Understanding NetFlow Deployment en.srt 3.95 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/005. 6.4 Understanding NetFlow Deployment.mp4 10.54 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/006. 6.5 Exploring Cisco Stealthwatch en.srt 2.82 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/006. 6.5 Exploring Cisco Stealthwatch.mp4 5.04 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/007. 6.6 Deploying Cisco Stealthwatch Cloud en.srt 4.36 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/007. 6.6 Deploying Cisco Stealthwatch Cloud.mp4 8.61 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/008. 6.7 On-Premise Monitoring with Stealthwatch Cloud en.srt 1.18 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/008. 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 2.57 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/009. 6.8 Exploring the Cisco TrustSec Solution en.srt 4.47 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/009. 6.8 Exploring the Cisco TrustSec Solution.mp4 9.99 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/010. 6.9 Describing the Benefits of Device Compliance and Application Control en.srt 2.94 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/010. 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 5.57 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/011. 6.10 Introducing Network Segmentation en.srt 2.85 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/011. 6.10 Introducing Network Segmentation.mp4 5.31 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/012. 6.11 Exploring Application-based Segmentation en.srt 2.97 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/012. 6.11 Exploring Application-based Segmentation.mp4 5.82 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/013. 6.12 Understanding Cisco ACI en.srt 3.63 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/013. 6.12 Understanding Cisco ACI.mp4 7.64 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/014. 6.13 Describing Network Access with CoA en.srt 2.36 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/014. 6.13 Describing Network Access with CoA.mp4 4.96 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/015. 6.14 Integrating Different Security Systems Using pxGrid en.srt 4.22 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/015. 6.14 Integrating Different Security Systems Using pxGrid.mp4 9.92 MB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr en.srt 9.39 KB
Module 3 AAA, Identity Management, Network Visibility, and Segmentation/Lesson 6 Secure Network Access, Visibility, and Segmentation/016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr.mp4 18.02 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/001. Module introduction en.srt 673 B
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/001. Module introduction.mp4 2.46 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/001. Learning objectives en.srt 1.31 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/001. Learning objectives.mp4 4.74 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt 7.10 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 12.92 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/003. 7.2 Configuring and Verifying Port Security en.srt 5.18 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/003. 7.2 Configuring and Verifying Port Security.mp4 11.89 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/004. 7.3 Configuring and Verifying DHCP Snooping en.srt 3.94 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/004. 7.3 Configuring and Verifying DHCP Snooping.mp4 11.32 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/005. 7.4 Configuring and Verifying Dynamic ARP Inspection en.srt 7.23 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/005. 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 15.58 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/006. 7.5 Exploring and Mitigating Common Layer 2 Threats en.srt 6.25 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/006. 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 15.54 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/007. 7.6 Understanding and Configuring BPDU Guard and Root Guard en.srt 3.19 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/007. 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 6.70 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/008. 7.7 Understanding and Configuring CDPLLDP en.srt 3.46 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/008. 7.7 Understanding and Configuring CDPLLDP.mp4 8.96 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt 8.33 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 15.08 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/010. 7.9 Exploring How to Secure the Management Plane en.srt 7.23 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/010. 7.9 Exploring How to Secure the Management Plane.mp4 14.22 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/011. 7.10 Exploring How to Secure the Control Plane en.srt 8.10 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/011. 7.10 Exploring How to Secure the Control Plane.mp4 15.02 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/012. 7.11 Exploring How to Secure the Data Plane en.srt 6.09 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 7 Infrastructure Security/012. 7.11 Exploring How to Secure the Data Plane.mp4 11.74 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/001. Learning objectives en.srt 1.76 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/001. Learning objectives.mp4 6.22 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/002. 8.1 Introducing Cisco Next-Generation Firewalls en.srt 10.40 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/002. 8.1 Introducing Cisco Next-Generation Firewalls.mp4 17.87 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/003. 8.2 Surveying the Cisco Firepower Management Center (FMC) en.srt 18.10 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/003. 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 44.31 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/004. 8.3 Exploring the Cisco Firepower Device Manager (FDM) en.srt 11.08 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/004. 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 23.97 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/005. 8.4 Implementing Access Control Policies en.srt 5.55 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 8 Cisco Next-Generation Firewalls/005. 8.4 Implementing Access Control Policies.mp4 7.79 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/001. Learning objectives en.srt 787 B
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/001. Learning objectives.mp4 2.58 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems en.srt 7.90 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 28.68 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven en.srt 2.37 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven.mp4 8.32 MB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems en.srt 6.48 KB
Module 4 Infrastructure Security, Firewalls, and Intrusion Prevention Systems/Lesson 9 Cisco Next-Generation Intrusion Prevention Systems/004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 11.89 MB
Module 5 Virtual Private Networks (VPNs)/001. Module introduction en.srt 411 B
Module 5 Virtual Private Networks (VPNs)/001. Module introduction.mp4 1.68 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/001. Learning objectives en.srt 729 B
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/001. Learning objectives.mp4 3.76 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs en.srt 11.02 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 18.11 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/003. 10.2 Configuring IPsec Site-to-site VPNs en.srt 3.78 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/003. 10.2 Configuring IPsec Site-to-site VPNs.mp4 5.59 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers en.srt 5.23 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 9.94 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/005. 10.4 Exploring DMVPN en.srt 10.97 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/005. 10.4 Exploring DMVPN.mp4 19.60 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/006. 10.5 Understanding GET VPN en.srt 8.36 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/006. 10.5 Understanding GET VPN.mp4 15.68 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/007. 10.6 Deploying FlexVPN en.srt 9.59 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/007. 10.6 Deploying FlexVPN.mp4 19.52 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/008. 10.7 Troubleshooting Site-to-site VPN Implementations en.srt 7.88 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 10 Site-to-site VPN Implementations/008. 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 13.43 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/001. Learning objectives en.srt 904 B
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/001. Learning objectives.mp4 4.34 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/002. 11.1 Introducing Remote Access VPNs en.srt 1.97 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/002. 11.1 Introducing Remote Access VPNs.mp4 3.70 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/003. 11.2 Exploring Clientless Remote Access VPNs en.srt 6.90 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/003. 11.2 Exploring Clientless Remote Access VPNs.mp4 12.47 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client en.srt 4.26 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 9.34 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD en.srt 5.11 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 11.97 MB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/006. 11.5 Troubleshooting Remote Access VPN Implementations en.srt 2.32 KB
Module 5 Virtual Private Networks (VPNs)/Lesson 11 Remote Access VPN/006. 11.5 Troubleshooting Remote Access VPN Implementations.mp4 4.68 MB
Module 6 Securing the Cloud and Content Security/001. Module introduction en.srt 772 B
Module 6 Securing the Cloud and Content Security/001. Module introduction.mp4 2.50 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/001. Learning objectives en.srt 1.28 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/001. Learning objectives.mp4 6.61 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/002. 12.1 Introducing the Different Cloud Deployment and Service Models en.srt 5.61 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/002. 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 11.39 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/003. 12.2 Surveying Patch Management in the Cloud en.srt 4.88 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/003. 12.2 Surveying Patch Management in the Cloud.mp4 8.26 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/004. 12.3 Performing Security Assessments in Cloud Environments en.srt 4.63 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/004. 12.3 Performing Security Assessments in Cloud Environments.mp4 11.58 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/005. 12.4 Introducing Agile, DevOps, and CICD Pipelines en.srt 12.62 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/005. 12.4 Introducing Agile, DevOps, and CICD Pipelines.mp4 22.05 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/006. 12.5 Introducing Serverless Computing en.srt 1.86 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/006. 12.5 Introducing Serverless Computing.mp4 3.68 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes en.srt 2.42 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 5.61 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/008. 12.7 Exploring the Concepts of DevSecOps en.srt 6.26 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/008. 12.7 Exploring the Concepts of DevSecOps.mp4 12.64 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/009. 12.8 Surveying Cisco Umbrella en.srt 7.83 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/009. 12.8 Surveying Cisco Umbrella.mp4 15.75 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/010. 12.9 Exploring Cisco Cloud Email Security en.srt 3.23 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/010. 12.9 Exploring Cisco Cloud Email Security.mp4 5.21 MB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/011. 12.10 Exploring Cisco Cloudlock en.srt 6.91 KB
Module 6 Securing the Cloud and Content Security/Lesson 12 Securing the Cloud/011. 12.10 Exploring Cisco Cloudlock.mp4 13.50 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/001. Learning objectives en.srt 1.68 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/001. Learning objectives.mp4 5.55 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/002. 13.1 Introducing Cisco Content Security Solutions en.srt 4.23 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/002. 13.1 Introducing Cisco Content Security Solutions.mp4 10.14 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification en.srt 3.83 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 8.25 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/004. 13.3 Introduction to Cisco Email Security en.srt 4.31 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/004. 13.3 Introduction to Cisco Email Security.mp4 13.00 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/005. 13.4 Exploring the Cisco ESA Deployment Model en.srt 2.79 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/005. 13.4 Exploring the Cisco ESA Deployment Model.mp4 5.19 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/006. 13.5 Understanding Email Security Features en.srt 4.66 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/006. 13.5 Understanding Email Security Features.mp4 9.48 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/007. 13.6 Discussing Email Security in the Cloud en.srt 4.68 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/007. 13.6 Discussing Email Security in the Cloud.mp4 9.18 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/008. 13.7 Introduction to Secure Internet Gateway (SIG) en.srt 3.50 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/008. 13.7 Introduction to Secure Internet Gateway (SIG).mp4 6.65 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella en.srt 3.55 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 10.13 MB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/010. 13.9 Exploring Cisco Umbrella Investigate en.srt 4.75 KB
Module 6 Securing the Cloud and Content Security/Lesson 13 Content Security/010. 13.9 Exploring Cisco Umbrella Investigate.mp4 10.65 MB
Module 7 Endpoint Security and Cisco Threat Response/001. Module introduction en.srt 354 B
Module 7 Endpoint Security and Cisco Threat Response/001. Module introduction.mp4 1.46 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/001. Learning objectives en.srt 2.03 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/001. Learning objectives.mp4 6.87 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/002. 14.1 Introducing AMP for Endpoints en.srt 3.73 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/002. 14.1 Introducing AMP for Endpoints.mp4 7.53 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/003. 14.2 Describing AMP for Endpoints Outbreak Control en.srt 8.64 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/003. 14.2 Describing AMP for Endpoints Outbreak Control.mp4 16.13 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions en.srt 3.24 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 7.29 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/005. 14.4 Understanding AMP IP Blacklists and Whitelists en.srt 3.73 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/005. 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 7.09 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/006. 14.5 Exploring Application Control in AMP for Endpoints en.srt 1.78 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/006. 14.5 Exploring Application Control in AMP for Endpoints.mp4 3.94 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/007. 14.6 Describing AMP for Endpoints Exclusion Sets en.srt 5.94 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/007. 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 11.41 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/008. 14.7 Introduction to AMP for Endpoints Policies en.srt 1.17 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/008. 14.7 Introduction to AMP for Endpoints Policies.mp4 1.95 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/009. 14.8 Describing the Anyconnect AMP Enabler en.srt 633 B
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/009. 14.8 Describing the Anyconnect AMP Enabler.mp4 1.14 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/010. 14.9 Exploring AMP for Endpoints Engines en.srt 1.99 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/010. 14.9 Exploring AMP for Endpoints Engines.mp4 3.30 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/011. 14.10 How to Utilize AMP for Endpoints Reporting Features en.srt 5.04 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/011. 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 9.06 MB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/012. 14.11 Introducing the Cisco Threat Response Solution en.srt 3.42 KB
Module 7 Endpoint Security and Cisco Threat Response/Lesson 14 Endpoint Protection and Detection/012. 14.11 Introducing the Cisco Threat Response Solution.mp4 11.14 MB
Summary/001. CCNP and CCIE Security Core SCOR 350-701 Summary en.srt 2.28 KB
Summary/001. CCNP and CCIE Security Core SCOR 350-701 Summary.mp4 11.21 MB
http://bt3.t-ru.org/ann?magnet

TorrentBank
Copyright © 2024