Implementing and Managing Palo Alto Next Generation Firewalls

File Type Create Time File Size Seeders Leechers Updated
Movie 2023-05-11 2.25GB 6 0 1 month ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Implementing  and  Managing  Palo  Alto  Next  Generation  Firewalls  
Related Torrents
  1. Next Generation Firewalls for Dummies prabhu_ 2.91MB
  2. Will Willis and Ian McLean -Implementing and Managing Micorosft Exchange Server 2003-.rar 77.42MB
  3. MCSA-MCSE-70-284-Implementing and Managing Microsoft Exchange Server 2003 E-Book H33T 1981CamaroZ28 6.20MB
  4. Pluralsight - Implementing and Managing Microsoft Azure Multi-factor Authentication by Neil Morrissey 825.53MB
  5. Pluralsight - Implementing and Managing Microsoft 365 Information Protection by Robert McMillen 331.65MB
  6. 70-284 Implementing and Managing Microsoft Exchange Server 2003 6.13MB
  7. iPad and iPhone User - APPLE-NEXT GENERATION + iWatch Revolution + Master iCloud (Issue 73, 2013) 12.20MB
  8. Palo Alto (2020) [SRV484] Difference and Repetition - A Musical Evocation of Gilles Deleuze 416.22MB
  9. [ CourseLala.com ] PluralSight - Configure NAT and VPNs Using Palo Alto Firewalls 875.89MB
  10. [ DevCourseWeb.com ] Udemy - Master Palo Alto Networks PCNSA Certification Mastery 1.41GB
Files
  1. 1/1. Course Overview/1. Course Overview.mp4 2.96MB
  2. 1/1. Course Overview/1. Course Overview.srt 2.29KB
  3. 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.mp4 11.87MB
  4. 1/2. Understand How Palo Alto Networks Products Work Together/1. Course Introduction and Legacy Firewall Overview.srt 12.61KB
  5. 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.mp4 4.88MB
  6. 1/2. Understand How Palo Alto Networks Products Work Together/2. Next-generation Firewall Overview.srt 6.12KB
  7. 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.mp4 8.95MB
  8. 1/2. Understand How Palo Alto Networks Products Work Together/3. Strata- Palo Alto Networks_ Next-generation Firewall.srt 10.64KB
  9. 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.mp4 11.47MB
  10. 1/2. Understand How Palo Alto Networks Products Work Together/4. Network Diagram.srt 7.08KB
  11. 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.mp4 9.83MB
  12. 1/2. Understand How Palo Alto Networks Products Work Together/5. Strata- Panorama and Security Subscriptions.srt 10.00KB
  13. 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.mp4 3.96MB
  14. 1/2. Understand How Palo Alto Networks Products Work Together/6. Prisma and Cortex Product Lines.srt 5.21KB
  15. 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.mp4 11.95MB
  16. 1/3. Initialize and License the Palo Alto Firewall/1. Initializing the Palo Alto Firewall.srt 10.01KB
  17. 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.mp4 23.73MB
  18. 1/3. Initialize and License the Palo Alto Firewall/2. GUI Overview and Management Settings.srt 15.92KB
  19. 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.mp4 19.45MB
  20. 1/3. Initialize and License the Palo Alto Firewall/3. Licensing the Firewall.srt 13.99KB
  21. 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.mp4 13.93MB
  22. 1/3. Initialize and License the Palo Alto Firewall/4. Configuration Management.srt 11.08KB
  23. 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.mp4 9.52MB
  24. 1/4. Administer the Palo Alto Firewall/1. Authentication Servers, Profiles, and Sequences.srt 7.98KB
  25. 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.mp4 8.16MB
  26. 1/4. Administer the Palo Alto Firewall/2. Configure Authentication Profiles.srt 6.01KB
  27. 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.mp4 4.57MB
  28. 1/4. Administer the Palo Alto Firewall/3. Admin Roles and Administrator Accounts.srt 6.66KB
  29. 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.mp4 18.02MB
  30. 1/4. Administer the Palo Alto Firewall/4. Configure Administrative Accounts.srt 14.15KB
  31. 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.mp4 9.43MB
  32. 1/4. Administer the Palo Alto Firewall/5. Verify and Troubleshoot Administrator Login.srt 5.46KB
  33. 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.mp4 7.83MB
  34. 1/4. Administer the Palo Alto Firewall/6. Admin Level Commit.srt 4.93KB
  35. 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.mp4 8.28MB
  36. 1/5. Update the Palo Alto Firewall/1. Potential Downfalls of Upgrading Content on a Palo Alto Firewall.srt 9.16KB
  37. 1/5. Update the Palo Alto Firewall/2. Updating Content ID.mp4 22.96MB
  38. 1/5. Update the Palo Alto Firewall/2. Updating Content ID.srt 13.78KB
  39. 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.mp4 30.22MB
  40. 1/5. Update the Palo Alto Firewall/3. Upgrading the PAN OS on a Standalone Firewall.srt 14.06KB
  41. 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).mp4 12.22MB
  42. 1/6. Configure Security Zones and Layer 3 Interfaces/1. Deployment Methods (Interface Types).srt 11.15KB
  43. 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.mp4 27.33MB
  44. 1/6. Configure Security Zones and Layer 3 Interfaces/2. Configuring Security Zones.srt 19.19KB
  45. 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.mp4 20.82MB
  46. 1/6. Configure Security Zones and Layer 3 Interfaces/3. Configuring Layer 3 Interfaces and Interface Management Profiles.srt 14.53KB
  47. 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.mp4 7.66MB
  48. 1/6. Configure Security Zones and Layer 3 Interfaces/4. Virtual Router Overview.srt 6.14KB
  49. 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.mp4 13.37MB
  50. 1/6. Configure Security Zones and Layer 3 Interfaces/5. Configuring the Virtual Router to Use OSPF.srt 9.43KB
  51. 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.mp4 16.05MB
  52. 1/6. Configure Security Zones and Layer 3 Interfaces/6. Verifying OSPF.srt 9.68KB
  53. 1/7. Understand App-ID and Other Objects/1. App-ID Overview.mp4 8.96MB
  54. 1/7. Understand App-ID and Other Objects/1. App-ID Overview.srt 8.50KB
  55. 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.mp4 28.10MB
  56. 1/7. Understand App-ID and Other Objects/2. Applications, Application Filters, and Application Groups.srt 17.53KB
  57. 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.mp4 12.43MB
  58. 1/7. Understand App-ID and Other Objects/3. Create Address Objects and Address Groups.srt 10.49KB
  59. 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.mp4 23.65MB
  60. 1/7. Understand App-ID and Other Objects/4. External Dyanmic Lists and Security Profiles.srt 14.99KB
  61. 1/7. Understand App-ID and Other Objects/5. Tags.mp4 12.19MB
  62. 1/7. Understand App-ID and Other Objects/5. Tags.srt 8.46KB
  63. 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.mp4 13.70MB
  64. 1/8. Shape Traffic Using Security Policy Rules/1. Security Policy Rules - Define the Matching Criteria.srt 11.12KB
  65. 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.mp4 5.66MB
  66. 1/8. Shape Traffic Using Security Policy Rules/2. Security Policy Rules - Define the Actions.srt 5.82KB
  67. 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.mp4 22.13MB
  68. 1/8. Shape Traffic Using Security Policy Rules/3. Create the First Security Rule.srt 16.38KB
  69. 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.mp4 21.52MB
  70. 1/8. Shape Traffic Using Security Policy Rules/4. Test the Initial Internet Gateway Policy.srt 11.47KB
  71. 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.mp4 19.13MB
  72. 1/8. Shape Traffic Using Security Policy Rules/5. Allow Management Updates on a Dataplane Interface and Allow OOBM Access.srt 11.72KB
  73. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.mp4 31.59MB
  74. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/1. Internet Gateway Best Practice Security Rules.srt 21.31KB
  75. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.mp4 24.42MB
  76. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/2. Datacenter Best Practice Security Rules.srt 16.83KB
  77. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.mp4 19.00MB
  78. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/3. Monitor Applications and Optimize Policies.srt 10.84KB
  79. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.mp4 6.74MB
  80. 1/9. Implement Palo Alto Networks’ Best Practices to Security Rules/4. Course Summary.srt 8.09KB
  81. 2/1. Course Overview/1. Course Overview.mp4 3.65MB
  82. 2/1. Course Overview/1. Course Overview.srt 2.38KB
  83. 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.mp4 3.77MB
  84. 2/2. Changing IP Addresses Using Network Address Translation/1. Course Intro.srt 4.80KB
  85. 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.mp4 5.04MB
  86. 2/2. Changing IP Addresses Using Network Address Translation/2. Overview of NAT and Why We Use It.srt 6.83KB
  87. 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.mp4 10.23MB
  88. 2/2. Changing IP Addresses Using Network Address Translation/3. Types of NAT You Can Configure.srt 12.96KB
  89. 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.mp4 9.58MB
  90. 2/2. Changing IP Addresses Using Network Address Translation/4. Flow Logic on the Palo Alto.srt 9.10KB
  91. 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.mp4 6.87MB
  92. 2/3. Configuring NAT on the Palo Alto Firewall/1. Introduction.srt 8.17KB
  93. 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.mp4 17.99MB
  94. 2/3. Configuring NAT on the Palo Alto Firewall/2. Configuring Static Source NAT.srt 15.26KB
  95. 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.mp4 9.39MB
  96. 2/3. Configuring NAT on the Palo Alto Firewall/3. Verifying NAT.srt 5.97KB
  97. 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.mp4 12.00MB
  98. 2/3. Configuring NAT on the Palo Alto Firewall/4. Configuring Dynamic NAT And DIPP.srt 9.66KB
  99. 2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.mp4 23.37MB
  100. 2/3. Configuring NAT on the Palo Alto Firewall/5. Configuring Destination NAT.srt 16.75KB
  101. 2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.mp4 13.50MB
  102. 2/3. Configuring NAT on the Palo Alto Firewall/6. Verifying NAT, Part II.srt 8.06KB
  103. 2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.mp4 20.76MB
  104. 2/3. Configuring NAT on the Palo Alto Firewall/7. Configuring U-turn NAT and No-NAT.srt 12.17KB
  105. 2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.mp4 4.53MB
  106. 2/3. Configuring NAT on the Palo Alto Firewall/8. Bidirectional NAT.srt 5.42KB
  107. 2/4. Understanding the Concepts of VPNs/1. Introduction.mp4 960.40KB
  108. 2/4. Understanding the Concepts of VPNs/1. Introduction.srt 1.38KB
  109. 2/4. Understanding the Concepts of VPNs/2. VPN Basics.mp4 2.70MB
  110. 2/4. Understanding the Concepts of VPNs/2. VPN Basics.srt 4.26KB
  111. 2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.mp4 8.31MB
  112. 2/4. Understanding the Concepts of VPNs/3. IKE VPNs Using IPSec.srt 12.93KB
  113. 2/4. Understanding the Concepts of VPNs/4. SSL VPNs.mp4 3.15MB
  114. 2/4. Understanding the Concepts of VPNs/4. SSL VPNs.srt 5.88KB
  115. 2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.mp4 3.67MB
  116. 2/4. Understanding the Concepts of VPNs/5. Route Base vs Policy Based VPNs.srt 5.88KB
  117. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.mp4 1.30MB
  118. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/1. Introduction.srt 1.98KB
  119. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.mp4 2.44MB
  120. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/2. Configuring a Site to Site VPN Overview.srt 3.00KB
  121. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.mp4 21.63MB
  122. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/3. Configuring a Site to Site VPN with a Palo Alto Firewall.srt 15.19KB
  123. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.mp4 9.53MB
  124. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/4. Using Certificates with Site to Site VPNs.srt 7.17KB
  125. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.mp4 15.46MB
  126. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/5. Configuring a Site to Site with a Cisco IOS Router.srt 9.22KB
  127. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.mp4 21.73MB
  128. 2/5. Configuring S2S VPNs on the Palo Alto Firewall/6. Troubleshooting Site to Site VPNs.srt 13.11KB
  129. 2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.mp4 1.65MB
  130. 2/6. Using Global Connect to Configure Remote Access VPNs/1. Introduction.srt 2.22KB
  131. 2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.mp4 5.28MB
  132. 2/6. Using Global Connect to Configure Remote Access VPNs/2. Global Protect Overview and Components.srt 7.63KB
  133. 2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.mp4 8.87MB
  134. 2/6. Using Global Connect to Configure Remote Access VPNs/3. Configuring GlobalProtect Prerequisites.srt 8.39KB
  135. 2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.mp4 21.46MB
  136. 2/6. Using Global Connect to Configure Remote Access VPNs/4. Configuring GlobalProtect Gateways.srt 16.93KB
  137. 2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.mp4 11.79MB
  138. 2/6. Using Global Connect to Configure Remote Access VPNs/5. Configuring GlobalProtect Portals.srt 9.81KB
  139. 2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.mp4 7.11MB
  140. 2/6. Using Global Connect to Configure Remote Access VPNs/6. Configuring Security Rules for GlobalProtect.srt 4.28KB
  141. 2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.mp4 16.08MB
  142. 2/6. Using Global Connect to Configure Remote Access VPNs/7. Connecting a Client to the VPN Using the GlobalProtect App.srt 9.46KB
  143. 3/1. Course Overview/1. Course Overview.mp4 3.37MB
  144. 3/1. Course Overview/1. Course Overview.srt 2.33KB
  145. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.mp4 4.47MB
  146. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/01. Course Intro.srt 5.98KB
  147. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.mp4 8.02MB
  148. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/02. New Features in PAN-OS 9.0, Overview of the Network Diagram, and Content ID Introduction.srt 10.77KB
  149. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.mp4 36.55MB
  150. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/03. Configuring Antivirus.srt 20.60KB
  151. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.mp4 11.71MB
  152. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/04. Configuring Anti-Spyware.srt 8.96KB
  153. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.mp4 14.74MB
  154. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/05. Configuring Vulnerability Protection.srt 8.29KB
  155. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.mp4 21.07MB
  156. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/06. Configuring URL Filtering.srt 17.07KB
  157. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.mp4 16.99MB
  158. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/07. Configuring Data Filtering.srt 14.65KB
  159. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.mp4 21.50MB
  160. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/08. Configuring Zone Protection Profiles.srt 18.80KB
  161. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.mp4 14.80MB
  162. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/09. Configuring DoS Protection Profiles.srt 15.78KB
  163. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.mp4 20.11MB
  164. 3/2. Configuring Content-ID™, Denial-of-Service Protection, and Zone Protection/10. Best Practices.srt 17.03KB
  165. 3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.mp4 2.37MB
  166. 3/3. Integrating with WildFire® and AutoFocus™/1. Module Introduction _ Flow Logic.srt 3.19KB
  167. 3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.mp4 11.03MB
  168. 3/3. Integrating with WildFire® and AutoFocus™/2. WildFire® _ AutoFocus™ Overview.srt 16.63KB
  169. 3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.mp4 20.33MB
  170. 3/3. Integrating with WildFire® and AutoFocus™/3. Configuring WildFire® _ File Blocking.srt 13.13KB
  171. 3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.mp4 28.40MB
  172. 3/3. Integrating with WildFire® and AutoFocus™/4. Verifying File Blocking _ WildFire®.srt 19.23KB
  173. 3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.mp4 14.60MB
  174. 3/3. Integrating with WildFire® and AutoFocus™/5. Threat Vault _ WildFire® Portal.srt 9.27KB
  175. 3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.mp4 10.47MB
  176. 3/3. Integrating with WildFire® and AutoFocus™/6. Security Profile Groups _ Security Rule Audit Logs.srt 8.87KB
  177. 3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.mp4 4.31MB
  178. 3/3. Integrating with WildFire® and AutoFocus™/7. Implementing AutoFocus.srt 5.78KB
  179. 3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.mp4 1.42MB
  180. 3/4. Joining the Enterprise PKI Infrastructure/1. Module Introduction.srt 1.95KB
  181. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).mp4 6.19MB
  182. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure(1).srt 7.56KB
  183. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.mp4 6.19MB
  184. 3/4. Joining the Enterprise PKI Infrastructure/2. Certificate Authorities, Certificate Signing Requests, and Public Key Infrastructure.srt 7.56KB
  185. 3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.mp4 16.26MB
  186. 3/4. Joining the Enterprise PKI Infrastructure/3. Generating a CSR _ Installing a Certificate.srt 10.83KB
  187. 3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.mp4 7.52MB
  188. 3/4. Joining the Enterprise PKI Infrastructure/4. Using a Certificate for Web Management Traffic.srt 6.69KB
  189. 3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.mp4 3.11MB
  190. 3/5. Decrypting Traffic on the Palo Alto Firewall/1. Module Introduction.srt 3.46KB
  191. 3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.mp4 5.07MB
  192. 3/5. Decrypting Traffic on the Palo Alto Firewall/2. Palo Alto Firewall Decryption Overview.srt 8.28KB
  193. 3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.mp4 6.77MB
  194. 3/5. Decrypting Traffic on the Palo Alto Firewall/3. Decryption Rollout Strategy.srt 11.06KB
  195. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).mp4 18.29MB
  196. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages(1).srt 14.24KB
  197. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.mp4 18.29MB
  198. 3/5. Decrypting Traffic on the Palo Alto Firewall/4. Configuring Forward Trust _ Untrust Certificates, and Understanding Response Pages.srt 14.24KB
  199. 3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.mp4 5.72MB
  200. 3/5. Decrypting Traffic on the Palo Alto Firewall/5. Configuring Decryption Profiles.srt 4.43KB
  201. 3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.mp4 21.73MB
  202. 3/5. Decrypting Traffic on the Palo Alto Firewall/6. Configuring SSL Forward Proxy.srt 14.56KB
  203. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).mp4 11.39MB
  204. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring(1).srt 7.20KB
  205. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.mp4 11.39MB
  206. 3/5. Decrypting Traffic on the Palo Alto Firewall/7. Configuring SSL Inbound Proxy, SSH Proxy, and Decyrption Mirroring.srt 7.20KB
  207. 3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.mp4 5.61MB
  208. 3/5. Decrypting Traffic on the Palo Alto Firewall/8. Decryption Broker Overview.srt 8.24KB
  209. 3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.mp4 3.13MB
  210. 3/5. Decrypting Traffic on the Palo Alto Firewall/9. Course Wrap Up.srt 5.23KB
  211. 4/1. Course Overview/1. Course Overview.mp4 2.89MB
  212. 4/1. Course Overview/1. Course Overview.srt 2.07KB
  213. 4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.mp4 13.84MB
  214. 4/2. Implement High Availability/1. Palo Alto Firewalls_ High Availability.srt 14.17KB
  215. 4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.mp4 11.54MB
  216. 4/2. Implement High Availability/2. Palo Alto HA Modes and Link Types.srt 10.94KB
  217. 4/2. Implement High Availability/3. Globomantics HA Deployment.mp4 8.27MB
  218. 4/2. Implement High Availability/3. Globomantics HA Deployment.srt 8.45KB
  219. 4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.mp4 19.10MB
  220. 4/2. Implement High Availability/4. Demo- Configure Active-Passive HA on the Primary Firewall.srt 12.03KB
  221. 4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.mp4 14.10MB
  222. 4/2. Implement High Availability/5. Demo- Configure Active-Passive HA on the Secondary Firewall.srt 7.82KB
  223. 4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.mp4 13.65MB
  224. 4/2. Implement High Availability/6. Demo- Verify that Active-Passive HA is Operational.srt 6.81KB
  225. 4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.mp4 23.21MB
  226. 4/2. Implement High Availability/7. Demo- Tune the Failover Conditions for an Active-Passive Configuration.srt 13.16KB
  227. 4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.mp4 13.81MB
  228. 4/2. Implement High Availability/8. Active-Active HA Firewall Clustering.srt 12.62KB
  229. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.mp4 10.88MB
  230. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/1. What Is Panorama-.srt 10.08KB
  231. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.mp4 12.63MB
  232. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/2. Demo- Panorama Overview.srt 8.30KB
  233. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.mp4 10.45MB
  234. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/3. Templates and Template Stacks.srt 13.34KB
  235. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.mp4 8.95MB
  236. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/4. Demo- Create Templates and Template Stacks on Panorama.srt 6.09KB
  237. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.mp4 13.39MB
  238. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/5. Demo- Add Values to Templates.srt 7.40KB
  239. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.mp4 16.37MB
  240. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/6. Demo- Add Firewalls to Templates.srt 9.80KB
  241. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.mp4 7.33MB
  242. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/7. Panorama Template Variables.srt 5.49KB
  243. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.mp4 18.49MB
  244. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/8. Demo- Configure Variables in Templates.srt 13.04KB
  245. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.mp4 22.38MB
  246. 4/3. Understand Palo Alto_s Panorama, and Implement Templates and Template Stacks/9. Demo- Push Panorama Configurations to Managed Firewalls.srt 16.37KB
  247. 4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.mp4 12.09MB
  248. 4/4. Implement Panorama Device Groups/1. Panorama Device Groups Overview.srt 9.72KB
  249. 4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.mp4 18.95MB
  250. 4/4. Implement Panorama Device Groups/2. Demo- Configure Device Groups On Panorama.srt 13.79KB
  251. 4/4. Implement Panorama Device Groups/3. Panorama Objects.mp4 4.17MB
  252. 4/4. Implement Panorama Device Groups/3. Panorama Objects.srt 4.78KB
  253. 4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.mp4 19.02MB
  254. 4/4. Implement Panorama Device Groups/4. Demo- Configure Objects In Device Groups.srt 13.28KB
  255. 4/4. Implement Panorama Device Groups/5. Panorama Policies.mp4 2.91MB
  256. 4/4. Implement Panorama Device Groups/5. Panorama Policies.srt 3.02KB
  257. 4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.mp4 20.13MB
  258. 4/4. Implement Panorama Device Groups/6. Demo- Configure Policies in Device Groups.srt 14.53KB
  259. 4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.mp4 21.32MB
  260. 4/4. Implement Panorama Device Groups/7. Demo- Import Existing Firewall Configuration into Panorama.srt 11.62KB
  261. 4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.mp4 20.53MB
  262. 4/4. Implement Panorama Device Groups/8. Clean up Panorama after Firewall Imports and Push Configurations to Firewalls.srt 13.75KB
  263. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.mp4 4.96MB
  264. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/1. Panorama Log Collectors.srt 4.00KB
  265. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.mp4 11.35MB
  266. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/2. Demo- Configure a Log Collector on Panorama.srt 8.93KB
  267. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.mp4 17.73MB
  268. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/3. Demo- Using Panorama to View Logs from All Firewalls.srt 10.12KB
  269. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.mp4 30.24MB
  270. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/4. Demo- Testing Firewall Loggin Appears on Panorama.srt 11.76KB
  271. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.mp4 16.99MB
  272. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/5. Demo- Using Panorama to Update Software on Firewalls.srt 9.40KB
  273. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.mp4 29.35MB
  274. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/6. Demo- Explore Panorama_s Troubleshooting and Administrative Tools.srt 16.96KB
  275. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.mp4 5.68MB
  276. 4/5. Explore How Panorama Interprets Traffic and Aids in Troubleshooting/7. Course Summary.srt 7.10KB
  277. 5/1. Course Overview/1. Course Overview.mp4 2.76MB
  278. 5/1. Course Overview/1. Course Overview.srt 1.94KB
  279. 5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.mp4 12.76MB
  280. 5/2. Understand and Configure Palo Alto Networks’ User-ID/1. Palo Alto Networks’ User-ID.srt 15.19KB
  281. 5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.mp4 15.36MB
  282. 5/2. Understand and Configure Palo Alto Networks’ User-ID/2. User-ID Requirements.srt 14.72KB
  283. 5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.mp4 14.60MB
  284. 5/2. Understand and Configure Palo Alto Networks’ User-ID/3. Demo- Create a Secure User-ID Service Account.srt 9.39KB
  285. 5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.mp4 23.61MB
  286. 5/2. Understand and Configure Palo Alto Networks’ User-ID/4. Demo- Configure User-ID Agent on an Active Directory Server.srt 18.68KB
  287. 5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.mp4 12.94MB
  288. 5/2. Understand and Configure Palo Alto Networks’ User-ID/5. Demo- Implement User-ID Components on a Palo Alto Firewall.srt 8.82KB
  289. 5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.mp4 10.57MB
  290. 5/2. Understand and Configure Palo Alto Networks’ User-ID/6. Demo- Implement User-ID Into Security Policies.srt 7.86KB
  291. 5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.mp4 15.04MB
  292. 5/2. Understand and Configure Palo Alto Networks’ User-ID/7. Demo- Verify User-ID is Working Properly.srt 8.53KB
  293. 5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.mp4 24.45MB
  294. 5/2. Understand and Configure Palo Alto Networks’ User-ID/8. Demo- Redistribute User-ID Mappings to Other Firewalls.srt 17.34KB
  295. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.mp4 11.32MB
  296. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/1. Dynamic User Groups and Their Components.srt 12.88KB
  297. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.mp4 15.22MB
  298. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/2. Demo- Configure Components for a Dynamic User Group.srt 15.25KB
  299. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.mp4 21.73MB
  300. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/3. Demo- Verify Dynamic User Groups.srt 12.86KB
  301. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.mp4 3.30MB
  302. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/4. Dynamic Address Groups.srt 4.24KB
  303. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.mp4 14.54MB
  304. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/5. Demo- Configure Dynamic Address Groups.srt 9.96KB
  305. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.mp4 13.25MB
  306. 5/3. Implement Dynamic User Groups and Dynamic Address Groups/6. Demo- Verify Dynamic Address Groups.srt 9.29KB
  307. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.mp4 11.56MB
  308. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/1. Multifactor Authentication.srt 9.79KB
  309. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.mp4 15.59MB
  310. 5/4. Implement Multifactor Authentication on a Palo Alto Firewall/2. Configure A Multifactor Authentication Server Profile.srt 11.48KB
  311. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.mp4 14.63MB
  312. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/1. Authentication Portal Overview and Components.srt 16.22KB
  313. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.mp4 16.11MB
  314. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/2. Demo- Configure Components for an Authentication Portal.srt 12.09KB
  315. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.mp4 8.99MB
  316. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/3. Demo- Configure Authentication Policies.srt 6.61KB
  317. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.mp4 9.61MB
  318. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/4. Demo- Verify Authentication Policies.srt 6.42KB
  319. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.mp4 2.03MB
  320. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/5. Insert Values into HTTP Headers.srt 2.24KB
  321. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.mp4 22.36MB
  322. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/6. Demo- Troubleshoot User-ID Issues.srt 18.56KB
  323. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.mp4 4.84MB
  324. 5/5. Understand and Configure Palo Alto’s Authentication Portal (Formerly Captive Portal)/7. Course Summary.srt 6.30KB
  325. 6/1. Course Overview/1. Course Overview.mp4 3.20MB
  326. 6/1. Course Overview/1. Course Overview.srt 2.37KB
  327. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.mp4 14.75MB
  328. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/1. Components You Need for a Palo Alto Home Lab.srt 14.68KB
  329. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.mp4 29.93MB
  330. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/2. Demo- Deploy a Palo Alto NGFW in AWS to Obtain Licensing.srt 15.11KB
  331. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.mp4 11.56MB
  332. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/3. Demo- Register with Palo Alto Support and Download Palo Alto Firewall Software.srt 6.92KB
  333. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.mp4 13.07MB
  334. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/4. Demo- Configure ESXi Networks to Support a Palo Alto NGFW.srt 9.47KB
  335. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.mp4 20.84MB
  336. 6/2. Deploy a Home Lab and Obtain Palo Alto Software/5. Demo- Import a Palo Alto NGFW into Your Hypervisor.srt 12.95KB
  337. 6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.mp4 12.31MB
  338. 6/3. Deploy and Configure Microsoft Server and Windows 10/1. What Devices You Add to Your Palo Alto Home Lab-.srt 9.40KB
  339. 6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.mp4 18.45MB
  340. 6/3. Deploy and Configure Microsoft Server and Windows 10/2. Demo- Deploy Microsoft Server into Hypervisor.srt 11.70KB
  341. 6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.mp4 11.96MB
  342. 6/3. Deploy and Configure Microsoft Server and Windows 10/3. Demo- Configure Active Directory for LDAP Authentication and User-ID.srt 7.33KB
  343. 6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.mp4 24.34MB
  344. 6/3. Deploy and Configure Microsoft Server and Windows 10/4. Demo- Configuring Certificate Services for Decryption.srt 11.49KB
  345. 6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.mp4 9.28MB
  346. 6/3. Deploy and Configure Microsoft Server and Windows 10/5. Demo- Deploy Windows 10iInto Hypervisor to Use for Testing.srt 6.87KB
  347. 6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.mp4 13.62MB
  348. 6/3. Deploy and Configure Microsoft Server and Windows 10/6. Demo- Deploy a VyOS Router in Your Lab.srt 7.99KB
  349. 6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.mp4 12.06MB
  350. 6/3. Deploy and Configure Microsoft Server and Windows 10/7. Demo- Verify Lab Components.srt 5.98KB
  351. 6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.mp4 4.24MB
  352. 6/3. Deploy and Configure Microsoft Server and Windows 10/8. Course Summary.srt 4.00KB