Cisco CCNP Security SCOR (Exam 350-701)

File Type Create Time File Size Seeders Leechers Updated
Movie 2024-03-20 5.11GB 1 0 1 day ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Cisco  CCNP  Security  SCOR  Exam  350  701  
Related Torrents
  1. [ DevCourseWeb.com ] Cisco CCNP Security SCOR 350-701 PassFast - Implementing and Operating Cisco Security Core Technologies (SCOR) 350-701.zip 5.03MB
  2. [ DevCourseWeb com ] Cisco CCNP Security SCOR 350-701 PassFast - Implementing and Operating Cisco Se - Downloader.exe 782.95KB
  3. [INE] CCNP Security SCOR exam pack [350-701, Ine, 2020, ENG] 13.80GB
  4. Cisco CCNP Security SNCF (Exam 300-710) 2.80GB
  5. CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR 16.81GB
  6. Cisco CCNP Data Center DCCOR (350-601) 2.11GB
  7. Cisco Press - Cisco CCNP Remote Access Exam Certification Guide 7.44MB
  8. Cisco Press - Cisco CCNP Remote Access Exam Certification Guide 7.44MB
  9. CISCO CCNP Security VPN 642-647 (Cisco, Pearson, 2012) BBS.pdf 16.28MB
  10. [ CourseWikia.com ] Cisco CCNP Security SNCF 300-710 PassFast - Securing Networks with Cisco Firepower (300-710-SNCF).zip 5.48MB
Files
  1. Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.mp4 162.25MB
  2. Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.mp4 47.04MB
  3. Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.en.srt 16.32KB
  4. Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.mp4 73.21MB
  5. Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.en.srt 29.33KB
  6. Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.mp4 102.72MB
  7. Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.en.srt 21.36KB
  8. Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.mp4 84.93MB
  9. Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.en.srt 21.26KB
  10. Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.mp4 92.50MB
  11. Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.en.srt 25.54KB
  12. Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.mp4 101.69MB
  13. Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.en.srt 19.41KB
  14. Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.mp4 75.47MB
  15. Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.en.srt 36.38KB
  16. Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.mp4 132.42MB
  17. Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.en.srt 27.83KB
  18. Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.mp4 136.59MB
  19. Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.en.srt 21.93KB
  20. Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.mp4 102.90MB
  21. Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.en.srt 12.39KB
  22. Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.mp4 53.06MB
  23. Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.en.srt 28.87KB
  24. Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.mp4 106.02MB
  25. Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.en.srt 17.44KB
  26. Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.mp4 74.91MB
  27. Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.en.srt 25.83KB
  28. Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.mp4 143.37MB
  29. Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.en.srt 30.57KB
  30. Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.mp4 127.96MB
  31. Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.en.srt 21.79KB
  32. Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.mp4 87.70MB
  33. Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.en.srt 27.42KB
  34. Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.mp4 120.63MB
  35. Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.en.srt 19.91KB
  36. Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.mp4 97.24MB
  37. Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.en.srt 24.43KB
  38. Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.mp4 92.91MB
  39. Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.en.srt 17.91KB
  40. Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.mp4 74.74MB
  41. Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.en.srt 15.01KB
  42. Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.mp4 60.42MB
  43. Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.en.srt 26.05KB
  44. Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.mp4 111.35MB
  45. Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.en.srt 12.10KB
  46. Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.mp4 50.07MB
  47. Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.en.srt 37.09KB
  48. Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.mp4 132.73MB
  49. Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.en.srt 16.53KB
  50. Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.mp4 72.33MB
  51. Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.en.srt 35.72KB
  52. Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.mp4 123.92MB
  53. Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.en.srt 19.34KB
  54. Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.mp4 74.96MB
  55. Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.en.srt 26.54KB
  56. Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.mp4 104.32MB
  57. Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.en.srt 13.28KB
  58. Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.mp4 52.84MB
  59. Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.en.srt 23.65KB
  60. Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.mp4 87.28MB
  61. Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.en.srt 22.30KB
  62. Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.mp4 86.82MB
  63. Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.en.srt 19.84KB
  64. Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.mp4 77.50MB
  65. Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.en.srt 26.15KB
  66. Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.mp4 106.27MB
  67. Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.en.srt 36.29KB
  68. Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.mp4 131.17MB
  69. Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.en.srt 34.39KB
  70. Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.en.srt 9.84KB
  71. Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.en.srt 13.96KB
  72. Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.mp4 61.12MB
  73. Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.en.srt 34.74KB
  74. Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.mp4 132.13MB
  75. Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.en.srt 32.09KB
  76. Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.mp4 123.89MB
  77. Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.en.srt 21.17KB
  78. Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.mp4 83.66MB
  79. Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.en.srt 22.29KB
  80. Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.mp4 87.00MB
  81. Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.en.srt 19.61KB
  82. Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.mp4 74.43MB
  83. Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.en.srt 24.22KB
  84. Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.mp4 92.99MB
  85. Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.en.srt 27.14KB
  86. Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.mp4 84.39MB
  87. Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.en.srt 22.73KB
  88. Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.mp4 80.81MB
  89. Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.en.srt 11.94KB
  90. Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.mp4 44.38MB
  91. Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.en.srt 13.86KB
  92. Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.mp4 53.78MB
  93. Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.en.srt 12.40KB
  94. Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.mp4 46.80MB
  95. Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.en.srt 7.65KB
  96. Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.mp4 30.15MB
  97. Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.en.srt 19.28KB
  98. Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.mp4 81.84MB
  99. Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.en.srt 16.59KB
  100. Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.mp4 81.96MB
  101. Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.en.srt 22.09KB
  102. Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.mp4 99.11MB
  103. Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.en.srt 17.15KB
  104. Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.mp4 73.62MB
  105. Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.en.srt 23.64KB
  106. Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.mp4 97.76MB
  107. Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.en.srt 23.98KB
  108. Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.mp4 87.69MB
  109. Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.en.srt 18.12KB
  110. Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.mp4 67.64MB
  111. Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.en.srt 9.00KB
  112. Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.mp4 37.29MB
  113. Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.en.srt 19.89KB
  114. Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.mp4 81.95MB
  115. Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.en.srt 12.71KB
  116. Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.mp4 48.87MB
  117. Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.en.srt 13.11KB
  118. Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.mp4 59.22MB
  119. Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.en.srt 12.89KB
  120. Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.mp4 54.73MB