种子简介
种子名称:
Cisco CCNP Security SCOR (Exam 350-701)
文件类型:
视频
文件数目:
60个文件
文件大小:
5.11 GB
收录时间:
2024-6-19 16:30
已经下载:
3次
资源热度:
91
最近下载:
2024-11-21 16:58
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:29ee833cbb2010ce1b1b11c432dcf47631924af8&dn=Cisco CCNP Security SCOR (Exam 350-701)
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Cisco CCNP Security SCOR (Exam 350-701).torrent
Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.mp4162.25MB
Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.mp447.04MB
Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.mp473.21MB
Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.mp4102.72MB
Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.mp484.93MB
Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.mp492.5MB
Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.mp4101.69MB
Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.mp475.47MB
Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.mp4132.42MB
Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.mp4136.59MB
Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.mp4102.9MB
Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.mp453.06MB
Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.mp4106.02MB
Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.mp474.91MB
Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.mp4143.37MB
Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.mp4127.96MB
Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.mp487.7MB
Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.mp4120.63MB
Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.mp497.24MB
Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.mp492.91MB
Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.mp474.74MB
Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.mp460.42MB
Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.mp4111.35MB
Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.mp450.07MB
Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.mp4132.73MB
Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.mp472.33MB
Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.mp4123.92MB
Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.mp474.96MB
Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.mp4104.32MB
Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.mp452.84MB
Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.mp487.28MB
Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.mp486.82MB
Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.mp477.5MB
Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.mp4106.27MB
Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.mp4131.17MB
Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.mp461.12MB
Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.mp4132.13MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.mp4123.89MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.mp483.66MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.mp487MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.mp474.43MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.mp492.99MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.mp484.39MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.mp480.81MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.mp444.38MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.mp453.78MB
Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.mp446.8MB
Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.mp430.15MB
Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.mp481.84MB
Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.mp481.96MB
Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.mp499.11MB
Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.mp473.62MB
Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.mp497.76MB
Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.mp487.69MB
Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.mp467.64MB
Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.mp437.29MB
Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.mp481.95MB
Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.mp448.87MB
Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.mp459.22MB
Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.mp454.73MB