首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2021-1-30 03:22
2024-12-21 04:22
389
16.81 GB
366
磁力链接
magnet:?xt=urn:btih:b8c6da9c620ba1c5702d51bf7c5a247c61f4e51f
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOmI4YzZkYTljNjIwYmExYzU3MDJkNTFiZjdjNWEyNDdjNjFmNGU1MWZaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
CBT
Nuggets
-
Implementing
and
Operating
Cisco
Security
Core
Technologies
350-701
SCOR
文件列表
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/05 - Hardening, Protecting, and Maintaining Cloud VMs.mp4
543.93MB
01 - Explain Common Threats Against On-premises and Cloud Environments/02 - Know Your Assets.mp4
23.14MB
01 - Explain Common Threats Against On-premises and Cloud Environments/03 - Know Your Vulnerabilities.mp4
15.99MB
01 - Explain Common Threats Against On-premises and Cloud Environments/04 - Know Your Threats.mp4
28.43MB
01 - Explain Common Threats Against On-premises and Cloud Environments/05 - Virus, Trojan, and Malware.. Oh my!.mp4
16.55MB
01 - Explain Common Threats Against On-premises and Cloud Environments/06 - Phishing and Social Engineering.mp4
17.49MB
01 - Explain Common Threats Against On-premises and Cloud Environments/07 - DDoS - Attacking Availability.mp4
12.63MB
01 - Explain Common Threats Against On-premises and Cloud Environments/08 - Spoofing and MitM Attacks.mp4
18.22MB
01 - Explain Common Threats Against On-premises and Cloud Environments/09 - Summarizing the Threat Landscape.mp4
8.09MB
02 - Compare Common Security Vulnerabilities/01 - Introducing Common Attack Vectors.mp4
7.15MB
02 - Compare Common Security Vulnerabilities/02 - Get to Know OWASP.mp4
32.82MB
02 - Compare Common Security Vulnerabilities/03 - The SQL Injection’; SELECT - FROM table.mp4
24.58MB
02 - Compare Common Security Vulnerabilities/04 - Cross-Site Scripting; var doCode{}.mp4
31.44MB
02 - Compare Common Security Vulnerabilities/05 - Password Protection.mp4
27.49MB
02 - Compare Common Security Vulnerabilities/06 - Plain-Text Protocols.mp4
28.52MB
02 - Compare Common Security Vulnerabilities/07 - The Buffer Overflow.mp4
8.84MB
02 - Compare Common Security Vulnerabilities/08 - Summarizing Common Vulnerabilities.mp4
5.8MB
03 - Components of Cryptography/01 - Introduction to Components of Cryptography.mp4
8.24MB
03 - Components of Cryptography/02 - Data Integrity.mp4
32.42MB
03 - Components of Cryptography/03 - Data Privacy.mp4
16.76MB
03 - Components of Cryptography/04 - SSL and TLS.mp4
31.48MB
03 - Components of Cryptography/05 - Public Key Infrastructure (PKI).mp4
17.67MB
03 - Components of Cryptography/06 - IPsec.mp4
16.54MB
03 - Components of Cryptography/07 - Authentication.mp4
21.57MB
03 - Components of Cryptography/08 - Components of Cryptography Summary.mp4
7.8MB
04 - IPsec Fundamentals/01 - Introduction to IPsec.mp4
7.08MB
04 - IPsec Fundamentals/02 - IPsec Overview.mp4
22.99MB
04 - IPsec Fundamentals/03 - IKEv1 and IKEv2.mp4
29.25MB
04 - IPsec Fundamentals/04 - Crypto Map IPsec.mp4
21.33MB
04 - IPsec Fundamentals/05 - VTI IPsec.mp4
17.56MB
04 - IPsec Fundamentals/06 - DMVPNs.mp4
11.61MB
04 - IPsec Fundamentals/07 - FlexVPN.mp4
12.76MB
04 - IPsec Fundamentals/08 - GET VPN.mp4
13.87MB
04 - IPsec Fundamentals/09 - NAT Traversal.mp4
24.14MB
04 - IPsec Fundamentals/10 - IPsec Fundamentals Summary.mp4
4.93MB
05 - Cisco Router Site-To-Site VPNs/01 - Introducing Site-To-Site VPNs.mp4
4.78MB
05 - Cisco Router Site-To-Site VPNs/02 - Planning for IPsec Site-To-Site.mp4
38.7MB
05 - Cisco Router Site-To-Site VPNs/03 - Designing a Site-To-Site VPN.mp4
20.49MB
05 - Cisco Router Site-To-Site VPNs/04 - Configuring an IKE Phase 1 Policy.mp4
46.03MB
05 - Cisco Router Site-To-Site VPNs/05 - Configuring an IKE Phase 2 (IPsec) Policy.mp4
66.2MB
05 - Cisco Router Site-To-Site VPNs/06 - Enabling the IPsec Policy.mp4
72.59MB
05 - Cisco Router Site-To-Site VPNs/07 - Protocol Analysis IPsec.mp4
30.6MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/01 - Introduction to P2P GRE over IPsec VPNs.mp4
4.55MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/02 - Overview of GRE over IPsec VPNs.mp4
36.7MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/03 - P2P GRE Tunnel Design.mp4
9.37MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/04 - P2P GRE Tunnel Implementation.mp4
33.17MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/05 - P2P GRE Tunnel Verification.mp4
28.11MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/06 - IPsec Tunnel Protection Design.mp4
14.48MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/07 - IPsec Virtual Tunnel Interface Configuration.mp4
65.69MB
06 - Cisco Point-To-Point GRE over IPsec VPNs/08 - IPsec Static VTI Verification.mp4
12.44MB
07 - Cisco DMVPN/01 - Introduction to DMVPN.mp4
5.44MB
07 - Cisco DMVPN/02 - DMVPN Overview.mp4
14.74MB
07 - Cisco DMVPN/03 - Planning for the mGRE Tunnel.mp4
12.63MB
07 - Cisco DMVPN/04 - mGRE Tunnel Configuration.mp4
12.41MB
07 - Cisco DMVPN/05 - NHRP Overview and Design.mp4
20.73MB
07 - Cisco DMVPN/06 - Configuring NHRP for DMVPN.mp4
27.35MB
07 - Cisco DMVPN/07 - Adding Routing to DMVPN.mp4
31.64MB
07 - Cisco DMVPN/08 - Verifying DMVPNs.mp4
33.43MB
07 - Cisco DMVPN/09 - Adding IPsec Protection Profiles.mp4
42.37MB
07 - Cisco DMVPN/10 - DMVPN Summary.mp4
4.61MB
08 - Cisco GET VPN/01 - Introduction to GET VPN.mp4
10.88MB
08 - Cisco GET VPN/02 - GET VPN Overview.mp4
23.5MB
08 - Cisco GET VPN/03 - GET VPN Key Servers (KS).mp4
27.05MB
08 - Cisco GET VPN/04 - GET VPN Members (GM).mp4
35.08MB
08 - Cisco GET VPN/05 - GET VPN Design.mp4
29.83MB
08 - Cisco GET VPN/06 - Implementing KS Configuration.mp4
48.67MB
08 - Cisco GET VPN/07 - Implementing GM Configuration.mp4
30.5MB
08 - Cisco GET VPN/08 - GET VPN verification.mp4
42.23MB
08 - Cisco GET VPN/09 - GET VPN Summary.mp4
9.18MB
09 - Cisco FlexVPN/01 - Introduction to FlexVPN.mp4
5.87MB
09 - Cisco FlexVPN/02 - FlexVPN Overview.mp4
20.5MB
09 - Cisco FlexVPN/03 - FlexVPN Components.mp4
22.7MB
09 - Cisco FlexVPN/04 - IKEv2 Flex VPN Site-To-Site Planning.mp4
15.9MB
09 - Cisco FlexVPN/05 - IKEv2 FlexVPN Site-To-Site Configuration.mp4
35.58MB
09 - Cisco FlexVPN/06 - IKEv2 FlexVPN Verification.mp4
28.87MB
09 - Cisco FlexVPN/07 - Adding Routing to FlexVPN.mp4
22.47MB
09 - Cisco FlexVPN/08 - FlexVPN Summary.mp4
8.05MB
10 - Cisco Remote Access VPNs/01 - Introduction to RA VPNs.mp4
6.92MB
10 - Cisco Remote Access VPNs/02 - RA VPN Overview.mp4
20.55MB
10 - Cisco Remote Access VPNs/03 - FlexVPN IPsec RA VPNs.mp4
36.14MB
10 - Cisco Remote Access VPNs/04 - FlexVPN RA Design.mp4
13.91MB
10 - Cisco Remote Access VPNs/05 - Setting CA Services in IOS.mp4
39.56MB
10 - Cisco Remote Access VPNs/06 - Configuring FlexVPN RA.mp4
49.5MB
10 - Cisco Remote Access VPNs/07 - AnyConnect Profile Editor.mp4
30.85MB
10 - Cisco Remote Access VPNs/08 - Testing and Verifying the RA VPN.mp4
33.77MB
10 - Cisco Remote Access VPNs/09 - Flex VPN RA Summary.mp4
5.53MB
11 - Debugging for IPsec Tunnels/01 - Introduction to Debugging IPsec.mp4
4.36MB
11 - Debugging for IPsec Tunnels/02 - Overview of IPsec Options.mp4
10.15MB
11 - Debugging for IPsec Tunnels/03 - Troubleshooting Tips for IPsec.mp4
23.75MB
11 - Debugging for IPsec Tunnels/04 - IKEv1, Phase 1, Missing Routes.mp4
61.18MB
11 - Debugging for IPsec Tunnels/05 - IKEv1, Phase 1, Bad Config.mp4
57.23MB
11 - Debugging for IPsec Tunnels/06 - IKEv1, Phase 2 Bad Config.mp4
49.99MB
11 - Debugging for IPsec Tunnels/07 - IKEv2 Troubleshooting.mp4
60.95MB
11 - Debugging for IPsec Tunnels/08 - Summary Troubleshooting IPsec.mp4
4.73MB
12 - Security Intelligence/01 - Introduction to Security Intelligence.mp4
7MB
12 - Security Intelligence/02 - Security Intelligence Overview.mp4
66.95MB
12 - Security Intelligence/03 - Cisco Talos Overview.mp4
10.42MB
12 - Security Intelligence/04 - Talos Vulnerability Information.mp4
27.62MB
12 - Security Intelligence/05 - Talos Reputation Center.mp4
22.41MB
12 - Security Intelligence/06 - Security Intelligence Summary.mp4
8.59MB
13 - Explain APIs in the SDN Architecture/01 - Introducing APIs and SDN.mp4
11.76MB
13 - Explain APIs in the SDN Architecture/02 - What is an API anyway.mp4
34.98MB
13 - Explain APIs in the SDN Architecture/03 - The Northbound API.mp4
17.07MB
13 - Explain APIs in the SDN Architecture/04 - The Southbound API.mp4
12.11MB
13 - Explain APIs in the SDN Architecture/05 - The Eastbound API.mp4
18.99MB
13 - Explain APIs in the SDN Architecture/06 - The Westbound API.mp4
14.91MB
13 - Explain APIs in the SDN Architecture/07 - Summarizing APIs and SDN.mp4
12.63MB
14 - DNA Center Foundations/01 - Introducing DNA Center.mp4
8.09MB
14 - DNA Center Foundations/02 - What DNA Center Does.mp4
33.82MB
14 - DNA Center Foundations/03 - What an SD-Access Fabric Does.mp4
28.76MB
14 - DNA Center Foundations/04 - The Four Workflows of DNA Center.mp4
27.67MB
14 - DNA Center Foundations/05 - The DNA Center Platform APIs.mp4
22.5MB
14 - DNA Center Foundations/06 - Summarizing DNA Center.mp4
7.41MB
15 - Interpret Basic Python Scripts used with Cisco Security/01 - Introducing Basic Python Security Scripts.mp4
14.49MB
15 - Interpret Basic Python Scripts used with Cisco Security/02 - Extending Python and Setting Variables.mp4
62.48MB
15 - Interpret Basic Python Scripts used with Cisco Security/03 - Getting Authenticated.mp4
61.19MB
15 - Interpret Basic Python Scripts used with Cisco Security/04 - Getting Monitored Applications.mp4
45.22MB
15 - Interpret Basic Python Scripts used with Cisco Security/05 - Summarizing Interpreting Python Scripts.mp4
17.27MB
16 - Troubleshoot NetFlow/01 - Introduction to Troubleshooting NetFlow.mp4
6.03MB
16 - Troubleshoot NetFlow/02 - NetFlow Overview.mp4
15.01MB
16 - Troubleshoot NetFlow/03 - Flavors of NetFlow.mp4
22.85MB
16 - Troubleshoot NetFlow/04 - NetFlow v5.mp4
20.44MB
16 - Troubleshoot NetFlow/05 - Flexible NetFlow.mp4
32.08MB
16 - Troubleshoot NetFlow/06 - NetFlow Collectors and Analyzers.mp4
17.81MB
17 - The Components of Network Security Design/01 - Intro to components of Network Security Design.mp4
9.36MB
17 - The Components of Network Security Design/02 - Network Access Control.mp4
43.46MB
17 - The Components of Network Security Design/03 - End Point Security.mp4
23.72MB
17 - The Components of Network Security Design/04 - Next Generation Firewalls and IPS.mp4
37.76MB
17 - The Components of Network Security Design/05 - TrustSec and MACsec.mp4
24.21MB
18 - Configure and Verify Cisco Port Security/01 - Introducing Port Security.mp4
13.22MB
18 - Configure and Verify Cisco Port Security/02 - Understanding Port Security and Why we Need It.mp4
36.25MB
18 - Configure and Verify Cisco Port Security/03 - Port Security Defaults.mp4
23.73MB
18 - Configure and Verify Cisco Port Security/04 - Implementing Port Security on Layer 2 Interface.mp4
30.27MB
18 - Configure and Verify Cisco Port Security/05 - Customizing Port Security.mp4
51.66MB
18 - Configure and Verify Cisco Port Security/06 - Configuring Auto Errdisable Recovery.mp4
52.3MB
18 - Configure and Verify Cisco Port Security/07 - Applying Port Security Skills in Production.mp4
28.34MB
18 - Configure and Verify Cisco Port Security/08 - Review of Configure and Verify Cisco Port Security.mp4
10.03MB
19 - Configure and Verify Cisco DHCP Snooping/01 - Introducing DHCP Snooping.mp4
11.95MB
19 - Configure and Verify Cisco DHCP Snooping/02 - Why is DHCP Snooping Needed.mp4
37.23MB
19 - Configure and Verify Cisco DHCP Snooping/03 - The Recipe for DHCP Snooping.mp4
30.15MB
19 - Configure and Verify Cisco DHCP Snooping/04 - Building and Implementing DHCP Snooping in PT.mp4
65.92MB
19 - Configure and Verify Cisco DHCP Snooping/05 - Adding Source Guard to a Switch.mp4
39.89MB
19 - Configure and Verify Cisco DHCP Snooping/06 - Applying DHCP Snooping in Production.mp4
71.04MB
19 - Configure and Verify Cisco DHCP Snooping/07 - Review of Configure and Verify Cisco DHCP Snooping.mp4
13MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/01 - Introducing Dynamic ARP Inspection (DAI).mp4
8.06MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/02 - Why is DAI Needed.mp4
17.86MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/03 - The Recipe and Commands for DAI.mp4
31.4MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/04 - Implementing DAI.mp4
36.77MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/05 - ARP Access Lists for Non-DHCP Devices.mp4
46.38MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/06 - Additional DAI Options and Features.mp4
45.82MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/07 - Applying DAI to the Production Network.mp4
33.32MB
20 - Configure and Verify Cisco Dynamic ARP Inspection/08 - Review of Configure and Verify Cisco Dynamic ARP Inspection.mp4
10.89MB
21 - Private VLANS/01 - Introduction to Private VLANs.mp4
10.32MB
21 - Private VLANS/02 - PVLANs Overview.mp4
25.6MB
21 - Private VLANS/03 - Promiscuous Ports.mp4
28.7MB
21 - Private VLANS/04 - PVLAN Design.mp4
13.83MB
21 - Private VLANS/05 - Implement PVLANs.mp4
23.02MB
21 - Private VLANS/06 - Verify PVLANs.mp4
37.41MB
21 - Private VLANS/07 - Trunking and PVLANs.mp4
31.66MB
21 - Private VLANS/08 - PVLAN Summary.mp4
7.48MB
22 - VRF-lite/01 - Introduction to VRF-lite.mp4
4.52MB
22 - VRF-lite/02 - VRF-lite Overview.mp4
43.59MB
22 - VRF-lite/03 - VRF-lite Configuration Basics.mp4
24.68MB
22 - VRF-lite/04 - VRFs on a Multi-Layer Switch.mp4
10.99MB
22 - VRF-lite/05 - VRF-lite Design.mp4
8.74MB
22 - VRF-lite/06 - VRF-lite Implementation.mp4
37.67MB
22 - VRF-lite/07 - VRF-lite Adding Routing.mp4
46.48MB
22 - VRF-lite/08 - VRF-lite Routing Verification.mp4
50.17MB
22 - VRF-lite/09 - DHCP VRF Services.mp4
36.68MB
22 - VRF-lite/10 - VRF-lite Summary.mp4
5.85MB
23 - Network Infrastructure Device Hardening/01 - Introduction to Device Hardening.mp4
4.6MB
23 - Network Infrastructure Device Hardening/02 - Device Hardening Overview.mp4
32.6MB
23 - Network Infrastructure Device Hardening/03 - Cisco Guide to Harden IOS Devices.mp4
21.3MB
23 - Network Infrastructure Device Hardening/04 - Management Plane Hardening.mp4
78.67MB
23 - Network Infrastructure Device Hardening/05 - Control Plane Hardening.mp4
30.23MB
23 - Network Infrastructure Device Hardening/06 - Data Plane Hardening.mp4
28.33MB
23 - Network Infrastructure Device Hardening/07 - Device Hardening Checklist.mp4
16.57MB
23 - Network Infrastructure Device Hardening/08 - Hardening Review.mp4
6.34MB
24 - Configure Cisco TrustSec/01 - Introduction to TrustSec.mp4
8.99MB
24 - Configure Cisco TrustSec/02 - TrustSec Overview.mp4
29.34MB
24 - Configure Cisco TrustSec/03 - TrustSec Security Groups.mp4
22.9MB
24 - Configure Cisco TrustSec/04 - Security Group ACLs.mp4
18.99MB
24 - Configure Cisco TrustSec/05 - TrustSec Policies.mp4
30.51MB
24 - Configure Cisco TrustSec/06 - Configure Network Devices for TrustSec.mp4
35.95MB
24 - Configure Cisco TrustSec/07 - ISE and NAD TrustSec Integration.mp4
20.19MB
24 - Configure Cisco TrustSec/08 - Verify TrustSec.mp4
65.63MB
24 - Configure Cisco TrustSec/09 - SGT eXchange Protocol (SXP).mp4
33.49MB
25 - Additional Layer 2 Security/01 - Introduction to Additional Layer 2 Security Options.mp4
16.04MB
25 - Additional Layer 2 Security/02 - Layer 2 Security Overview.mp4
40.35MB
25 - Additional Layer 2 Security/03 - Storm Control.mp4
81.05MB
25 - Additional Layer 2 Security/04 - Root Guard.mp4
68.05MB
25 - Additional Layer 2 Security/05 - BPDU Guard.mp4
61.81MB
25 - Additional Layer 2 Security/06 - Summary of Layer 2 Security.mp4
14.1MB
26 - EIGRP Neighbor Relationships and Authentication/01 - Introduction to EIGRP Relationships and Authentication.mp4
5.9MB
26 - EIGRP Neighbor Relationships and Authentication/02 - Neighborship Overview.mp4
22.79MB
26 - EIGRP Neighbor Relationships and Authentication/03 - Authentication Overview.mp4
60.2MB
26 - EIGRP Neighbor Relationships and Authentication/04 - EIGRP Hands on Lab with Authentication.mp4
43.61MB
27 - Troubleshoot OSPF Authentication for IPv4/01 - Intro to IPv4 OSPF Authentication and Troubleshooting.mp4
6.09MB
27 - Troubleshoot OSPF Authentication for IPv4/02 - Overview of OSPF Authentication.mp4
96.21MB
27 - Troubleshoot OSPF Authentication for IPv4/03 - Implement OSPF Authentication.mp4
71.45MB
27 - Troubleshoot OSPF Authentication for IPv4/04 - Virtual Links and Authentication.mp4
23.36MB
27 - Troubleshoot OSPF Authentication for IPv4/05 - Troubleshooting OSPF Authentication Lab 01.mp4
77.1MB
27 - Troubleshoot OSPF Authentication for IPv4/06 - Troubleshooting OSPF Authentication Lab 02.mp4
101.42MB
28 - Troubleshoot OSPF Authentication for IPv6/01 - Intro to IPv6 OSPF Authentication and Troubleshooting.mp4
5.02MB
28 - Troubleshoot OSPF Authentication for IPv6/02 - IPv6 OSPF Authentication Overview.mp4
82.88MB
28 - Troubleshoot OSPF Authentication for IPv6/03 - Implement and Verify Authentication.mp4
45.23MB
28 - Troubleshoot OSPF Authentication for IPv6/04 - Troubleshooting OSPF Authentication Lab 01.mp4
67.41MB
28 - Troubleshoot OSPF Authentication for IPv6/05 - Troubleshooting OSPF Authentication Lab 02.mp4
53.69MB
29 - Firepower Access Control Policies/01 - Access Control Policy Overview.mp4
32.58MB
29 - Firepower Access Control Policies/02 - Access Control Policy Rule Actions Concepts.mp4
24.91MB
29 - Firepower Access Control Policies/03 - Access Control Policy Rule Actions Demonstration.mp4
25.78MB
29 - Firepower Access Control Policies/04 - URL Filtering.mp4
26.33MB
29 - Firepower Access Control Policies/05 - Malware and File Inspections.mp4
34.08MB
29 - Firepower Access Control Policies/06 - SSL-TLS Decryption.mp4
33.69MB
29 - Firepower Access Control Policies/07 - IPS Inspection.mp4
18.3MB
30 - Management Options to Improve Security/01 - Introduction to Secure Network Management.mp4
6.52MB
30 - Management Options to Improve Security/02 - Overview of Secure Management.mp4
39.44MB
30 - Management Options to Improve Security/03 - Syslog Overview.mp4
38.17MB
30 - Management Options to Improve Security/04 - NTP with Authentication.mp4
39.33MB
30 - Management Options to Improve Security/05 - Change Control.mp4
13.82MB
31 - Troubleshoot SNMP/01 - Introduction to Troubleshooting SNMP.mp4
4.74MB
31 - Troubleshoot SNMP/02 - SNMP Overview.mp4
37.78MB
31 - Troubleshoot SNMP/03 - SNMPv2 Configuration.mp4
48.34MB
31 - Troubleshoot SNMP/04 - SNMPv3 Client Configuration.mp4
62.07MB
31 - Troubleshoot SNMP/05 - SNMPv3 Server Configuration.mp4
22.79MB
31 - Troubleshoot SNMP/06 - Troubleshooting SNMP.mp4
34.15MB
32 - Troubleshoot Network Problems using Logging/01 - Introduction to Troubleshooting using Logging.mp4
4.87MB
32 - Troubleshoot Network Problems using Logging/02 - Logging Overview.mp4
20.47MB
32 - Troubleshoot Network Problems using Logging/03 - Configuring Logging.mp4
63.39MB
32 - Troubleshoot Network Problems using Logging/04 - Conditional Debugging.mp4
44MB
33 - Cloud Service and Deployment Models/01 - Planning for Cloud Services.mp4
131.27MB
33 - Cloud Service and Deployment Models/02 - Plan for Infrastructure As A Service.mp4
106.06MB
33 - Cloud Service and Deployment Models/03 - Plan for Platform As A Service.mp4
94.31MB
33 - Cloud Service and Deployment Models/04 - Plan for Software As A Service.mp4
80.32MB
33 - Cloud Service and Deployment Models/05 - Plan for Cloud Deployment Models.mp4
136.3MB
34 - Planning for Software Development Methodologies/01 - Software and App Development Methodologies.mp4
43.74MB
34 - Planning for Software Development Methodologies/02 - Plan for Waterfall Method.mp4
84.38MB
34 - Planning for Software Development Methodologies/03 - Plan for Lean and Agile Methods.mp4
81.04MB
34 - Planning for Software Development Methodologies/04 - Plan for Kanban and Scrum Teams.mp4
52.18MB
34 - Planning for Software Development Methodologies/05 - Continuous Integration, Deployment, and Delivery.mp4
65.72MB
34 - Planning for Software Development Methodologies/06 - Understand CICD Pipelines in Action.mp4
103.21MB
34 - Planning for Software Development Methodologies/07 - Plan for DevOps.mp4
111.09MB
34 - Planning for Software Development Methodologies/08 - Plan for DevSecOps.mp4
108.79MB
35 - Planning for and Securing Cloud Software-as-a-Service/01 - Planning for Software-as-a-Service Security.mp4
83.83MB
35 - Planning for and Securing Cloud Software-as-a-Service/02 - Federating Identities with SAML, OAuth, and OpenID.mp4
265.5MB
35 - Planning for and Securing Cloud Software-as-a-Service/03 - Cisco Zero-Trust for the Workforce.mp4
405.78MB
35 - Planning for and Securing Cloud Software-as-a-Service/04 - Cisco Cloudlock Access Security Broker.mp4
294.19MB
35 - Planning for and Securing Cloud Software-as-a-Service/05 - Securing DNS with Cisco Umbrella and OpenDNS.mp4
415.29MB
35 - Planning for and Securing Cloud Software-as-a-Service/06 - Securing Communications with Cisco Email Security.mp4
448.6MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/01 - Planning for Cloud Infrastructure Security.mp4
69.65MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/02 - Assessing Cloud Service Providers.mp4
228.09MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/03 - Isolating and Segmenting Cloud Networks.mp4
332.82MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/04 - Leveraging Virtual Appliances.mp4
397.41MB
01 - Explain Common Threats Against On-premises and Cloud Environments/01 - Introducing the Cybersecurity Landscape.mp4
16.31MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/06 - Planning for Infrastructure-as-Code.mp4
389.13MB
36 - Planning for and Securing Cloud Infrastructure-as-a-Service/07 - Zero Trust Token Auth Demo.mp4
210.06MB
37 - Planning for and Securing Cloud Platform-as-a-Service/01 - Securing Cloud Platform-as-a-Service.mp4
68.87MB
37 - Planning for and Securing Cloud Platform-as-a-Service/02 - Plan for Containers.mp4
363.64MB
37 - Planning for and Securing Cloud Platform-as-a-Service/03 - Secure Container Images and Registries.mp4
431.65MB
37 - Planning for and Securing Cloud Platform-as-a-Service/04 - Orchestrating Containers.mp4
396.13MB
37 - Planning for and Securing Cloud Platform-as-a-Service/05 - Open Web Application Security Project Controls.mp4
266.15MB
37 - Planning for and Securing Cloud Platform-as-a-Service/06 - OWASP Protective Controls Continued.mp4
267.67MB
37 - Planning for and Securing Cloud Platform-as-a-Service/07 - Cisco Zero-Trust Architecture Overview.mp4
267.32MB
37 - Planning for and Securing Cloud Platform-as-a-Service/08 - Securing Workloads with Cisco Tetration.mp4
536.24MB
37 - Planning for and Securing Cloud Platform-as-a-Service/09 - Visibility with Cisco AppDynamics.mp4
424.65MB
38 - Capture and Redirection Methods/01 - Introduction to Capture and Redirection Methods.mp4
6.39MB
38 - Capture and Redirection Methods/02 - Capture and Redirection Overview.mp4
12.4MB
38 - Capture and Redirection Methods/03 - Policy Based Routing (PBR) Overview.mp4
10.78MB
38 - Capture and Redirection Methods/04 - PBR Configuration and Testing.mp4
29.38MB
38 - Capture and Redirection Methods/05 - WCCP Overview and Planning.mp4
10.71MB
38 - Capture and Redirection Methods/06 - WSA Configuration for WCCP.mp4
20.13MB
38 - Capture and Redirection Methods/07 - IOS Configuration for WCCP.mp4
42.23MB
38 - Capture and Redirection Methods/08 - Testing WCCP.mp4
16.87MB
38 - Capture and Redirection Methods/09 - Traffic Redirection Summary.mp4
8.59MB
39 - Cisco Web Security/01 - Introduction to Cisco Web Security.mp4
5.47MB
39 - Cisco Web Security/02 - Web Security Appliance Overview.mp4
33.26MB
39 - Cisco Web Security/03 - WSA and AD Integration.mp4
18.93MB
39 - Cisco Web Security/04 - WSA Identification Profiles.mp4
29.91MB
39 - Cisco Web Security/05 - WSA Access Policies.mp4
27.62MB
39 - Cisco Web Security/06 - WSA Application Filtering.mp4
29.04MB
39 - Cisco Web Security/07 - WSA TLS Decryption Overview.mp4
15.44MB
39 - Cisco Web Security/08 - WSA Certificate Management.mp4
33.96MB
39 - Cisco Web Security/09 - WSA Decryption Policy.mp4
32.72MB
39 - Cisco Web Security/10 - WSA Additional Security Features.mp4
16.78MB
40 - Cisco Email Security/01 - Introduction to Cisco Email Security.mp4
3.96MB
40 - Cisco Email Security/02 - Cisco Email Security Overview.mp4
25.68MB
40 - Cisco Email Security/03 - ESA Inbound Mail Overview.mp4
34.48MB
40 - Cisco Email Security/04 - Blocking Incoming Email.mp4
19.93MB
40 - Cisco Email Security/05 - ESA Outbound Mail Overview.mp4
32.16MB
40 - Cisco Email Security/06 - SPAM Filtering.mp4
17.28MB
40 - Cisco Email Security/07 - Email Anti-Virus.mp4
9.08MB
40 - Cisco Email Security/08 - DLP.mp4
14.98MB
40 - Cisco Email Security/09 - Encryption.mp4
15.99MB
41 - Cisco Umbrella/01 - Introduction to Cisco Umbrella.mp4
6.02MB
41 - Cisco Umbrella/02 - Cisco Umbrella Overview.mp4
50.48MB
41 - Cisco Umbrella/03 - Umbrella Components.mp4
38.5MB
41 - Cisco Umbrella/04 - Policy Overview.mp4
75.03MB
41 - Cisco Umbrella/05 - Policy Components.mp4
30.57MB
41 - Cisco Umbrella/06 - Policy Creation.mp4
25.34MB
41 - Cisco Umbrella/07 - Core Identities.mp4
24MB
41 - Cisco Umbrella/08 - Umbrella CA Certificates.mp4
23.22MB
41 - Cisco Umbrella/09 - Reporting and Investigation.mp4
22.35MB
41 - Cisco Umbrella/10 - Umbrella VA.mp4
94.66MB
41 - Cisco Umbrella/11 - Umbrella Summary.mp4
6.88MB
42 - Understand and Configure AMP for Endpoints/01 - Introducing Endpoint Security.mp4
25.93MB
42 - Understand and Configure AMP for Endpoints/02 - The Types of Endpoint Protection.mp4
21.29MB
42 - Understand and Configure AMP for Endpoints/03 - Introducing Advanced Malware Protection (AMP) for Endpoints.mp4
32.83MB
42 - Understand and Configure AMP for Endpoints/04 - Configuring Simple Outbreak Controls in AMP.mp4
31.08MB
42 - Understand and Configure AMP for Endpoints/05 - Explore Other Outbreak Controls.mp4
23.05MB
42 - Understand and Configure AMP for Endpoints/06 - Understand Groups and Policies.mp4
22.64MB
42 - Understand and Configure AMP for Endpoints/07 - Summarizing Endpoint Security.mp4
6.7MB
43 - Explain Various Types of Endpoint Defenses/01 - Introducing Endpoint Defense Mechanisms.mp4
14.94MB
43 - Explain Various Types of Endpoint Defenses/02 - Anti-Virus and Anti-Malware.mp4
20.86MB
43 - Explain Various Types of Endpoint Defenses/03 - Indicators of Compromise (IoC).mp4
22.43MB
43 - Explain Various Types of Endpoint Defenses/04 - Retrospective Analysis.mp4
15.34MB
43 - Explain Various Types of Endpoint Defenses/05 - Dynamic File Analysis.mp4
17.02MB
43 - Explain Various Types of Endpoint Defenses/06 - Summarizing Endpoint Protection Mechanisms.mp4
9.49MB
44 - Endpoint Security/01 - Introduction to Endpoint Security.mp4
15.59MB
44 - Endpoint Security/02 - Why Endpoint Protection is Critical.mp4
20.24MB
44 - Endpoint Security/03 - The Value of Mobile Device Management.mp4
22.89MB
44 - Endpoint Security/04 - Using Multi-Factor Authentication.mp4
48.79MB
44 - Endpoint Security/05 - Posture Assessment for Endpoint Security.mp4
26.18MB
44 - Endpoint Security/06 - Patching Endpoints.mp4
15.06MB
45 - Describe Controls for End Users' Network Access/01 - Introducing Network Access Control for Endpoints.mp4
16.14MB
45 - Describe Controls for End Users' Network Access/02 - Endpoint Profiling.mp4
42.47MB
45 - Describe Controls for End Users' Network Access/03 - Identity-Based Authentication.mp4
38.41MB
45 - Describe Controls for End Users' Network Access/04 - Authenticating with AnyConnect.mp4
44.3MB
45 - Describe Controls for End Users' Network Access/05 - Posture Assessment.mp4
27.75MB
45 - Describe Controls for End Users' Network Access/06 - Cisco TrustSec and Security Group Tags (SGTs).mp4
31.99MB
45 - Describe Controls for End Users' Network Access/07 - Change of Authorization (CoA).mp4
28.13MB
45 - Describe Controls for End Users' Network Access/08 - Summarizing Network Access Controls for Endpoints.mp4
7.06MB
46 - 802.1X Fundamentals/01 - Introduction to 802.1x Fundamentals.mp4
8.85MB
46 - 802.1X Fundamentals/02 - Network Authentication and Authorization.mp4
34.09MB
46 - 802.1X Fundamentals/03 - Options for Authentication.mp4
33.43MB
46 - 802.1X Fundamentals/04 - Options after Authentication.mp4
34.92MB
47 - Configure a Switch for 802.1X/01 - Introduction to Switch Configuration for 802.1X.mp4
5.08MB
47 - Configure a Switch for 802.1X/02 - Configure Global AAA Parameters.mp4
43.12MB
47 - Configure a Switch for 802.1X/03 - Port Configuration.mp4
32.7MB
47 - Configure a Switch for 802.1X/04 - Testing and Verifying.mp4
24.78MB
47 - Configure a Switch for 802.1X/05 - Switch Configuration Summary.mp4
3.24MB
48 - Configure ISE for 802.1X/01 - Introduction to Configuring ISE.mp4
5.48MB
48 - Configure ISE for 802.1X/02 - Identity Stores.mp4
12.59MB
48 - Configure ISE for 802.1X/03 - Configure ISE to use AD.mp4
13.92MB
48 - Configure ISE for 802.1X/04 - Adding Network Devices to ISE.mp4
26.38MB
48 - Configure ISE for 802.1X/05 - Policy Set Overview.mp4
56.52MB
48 - Configure ISE for 802.1X/06 - Creating a Policy Set.mp4
51.4MB
48 - Configure ISE for 802.1X/07 - Authorization Policies.mp4
39.87MB
48 - Configure ISE for 802.1X/08 - Summary.mp4
7.36MB
49 - Explain Exfiltration Techniques/01 - Introducing Attacker Exfiltration Techniques.mp4
13.48MB
49 - Explain Exfiltration Techniques/02 - DNS Tunneling Exfiltration.mp4
28.06MB
49 - Explain Exfiltration Techniques/03 - HTTP(S) Exfiltration.mp4
32.35MB
49 - Explain Exfiltration Techniques/04 - Outbound File Transfers.mp4
18.81MB
49 - Explain Exfiltration Techniques/05 - Text-Based Protocols.mp4
23.34MB
49 - Explain Exfiltration Techniques/06 - Recapping Exfiltration Techniques.mp4
7.96MB
50 - Explaining the Benefits of Streaming Telemetry/01 - Introducing Streaming Telemetry.mp4
14.31MB
50 - Explaining the Benefits of Streaming Telemetry/02 - What is Telemetry.mp4
17.41MB
50 - Explaining the Benefits of Streaming Telemetry/03 - Network Telemetry.mp4
27.34MB
50 - Explaining the Benefits of Streaming Telemetry/04 - Endpoint Telemetry.mp4
25.06MB
50 - Explaining the Benefits of Streaming Telemetry/05 - Summarizing Telemetry.mp4
7.17MB
51 - Describing the Features of Various Cisco Security Offerings/01 - Introducing Cisco Security Platforms.mp4
4.71MB
51 - Describing the Features of Various Cisco Security Offerings/02 - Stealthwatch.mp4
30.87MB
51 - Describing the Features of Various Cisco Security Offerings/03 - pXGrid.mp4
27.55MB
51 - Describing the Features of Various Cisco Security Offerings/04 - Umbrella Investigate.mp4
30.62MB
51 - Describing the Features of Various Cisco Security Offerings/05 - Cognitive Threat Analytics.mp4
18.12MB
51 - Describing the Features of Various Cisco Security Offerings/06 - AnyConnect Network Visibility Module.mp4
22.29MB
51 - Describing the Features of Various Cisco Security Offerings/07 - Summarizing Cisco Security Platforms.mp4
4.92MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统