zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Cisco CCNP Security SCOR (Exam 350-701)
magnet:?xt=urn:btih:29ee833cbb2010ce1b1b11c432dcf47631924af8&dn=Cisco CCNP Security SCOR (Exam 350-701)
磁力链接详情
Hash值:
29ee833cbb2010ce1b1b11c432dcf47631924af8
点击数:
111
文件大小:
5.11 GB
文件数量:
60
创建日期:
2024-6-19 16:30
最后访问:
2025-1-12 18:23
访问标签:
Cisco
CCNP
Security
SCOR
Exam
350-701
文件列表详情
Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.mp4 162.25 MB
Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.mp4 47.04 MB
Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.mp4 73.21 MB
Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.mp4 102.72 MB
Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.mp4 84.93 MB
Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.mp4 92.5 MB
Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.mp4 101.69 MB
Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.mp4 75.47 MB
Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.mp4 132.42 MB
Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.mp4 136.59 MB
Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.mp4 102.9 MB
Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.mp4 53.06 MB
Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.mp4 106.02 MB
Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.mp4 74.91 MB
Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.mp4 143.37 MB
Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.mp4 127.96 MB
Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.mp4 87.7 MB
Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.mp4 120.63 MB
Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.mp4 97.24 MB
Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.mp4 92.91 MB
Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.mp4 74.74 MB
Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.mp4 60.42 MB
Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.mp4 111.35 MB
Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.mp4 50.07 MB
Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.mp4 132.73 MB
Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.mp4 72.33 MB
Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.mp4 123.92 MB
Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.mp4 74.96 MB
Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.mp4 104.32 MB
Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.mp4 52.84 MB
Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.mp4 87.28 MB
Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.mp4 86.82 MB
Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.mp4 77.5 MB
Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.mp4 106.27 MB
Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.mp4 131.17 MB
Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.mp4 61.12 MB
Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.mp4 132.13 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.mp4 123.89 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.mp4 83.66 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.mp4 87 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.mp4 74.43 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.mp4 92.99 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.mp4 84.39 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.mp4 80.81 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.mp4 44.38 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.mp4 53.78 MB
Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.mp4 46.8 MB
Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.mp4 30.15 MB
Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.mp4 81.84 MB
Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.mp4 81.96 MB
Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.mp4 99.11 MB
Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.mp4 73.62 MB
Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.mp4 97.76 MB
Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.mp4 87.69 MB
Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.mp4 67.64 MB
Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.mp4 37.29 MB
Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.mp4 81.95 MB
Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.mp4 48.87 MB
Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.mp4 59.22 MB
Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.mp4 54.73 MB
其他位置