Pearson IT CCNP and CCIE Security Core SCOR 350.701, 2020, ENG

File Type Create Time File Size Seeders Leechers Updated
Movie 2022-02-12 14.29GB 0 2 4 weeks ago
Download
Magnet link   or   Save Instantly without Torrenting   or   Torrent download

To download this file, you need a free bitTorrent client such as qBittorrent.

Report Abuse
Tags
Pearson  CCNP  and  CCIE  Security  Core  SCOR  350  701  2020  ENG  
Related Torrents
  1. Cisco CCNP Security SCOR (Exam 350-701) 5.11GB
  2. CCNP-CCIE Security Books Collection 847.28MB
  3. CCNP-CCIE Security Books Collection.zip 704.30MB
  4. The Boy 1 and 2 Collection - Horror 2016 2020 Eng Rus Multi Subs 720p [H264-mp4] 2.60GB
  5. Cryptopia - Bitcoin, Blockchains and the Future of the Internet 2020 ENG XTO.M1125 3.19GB
  6. sw-dvd-9-win-svr-std-core-and-data-ctr-core-2016-64-bit-english-2-mlf-x-21-22843_202205 5.30GB
  7. [ DevCourseWeb.com ] Udemy - Web3 And Blockchain Security - Pen Testing and Bug Bounty Part1 1.08GB
  8. anime-mo-dao-zu-shi-q-the-founder-of-diabolism-q-2020-eng-sub 986.95MB
  9. Unhinged 2020 ENG FHD1080P H265.HEVC (drkrz) 786.81MB
  10. [ FreeCourseWeb.com ] Cryptography and Data Security - Book 1 - Proper Guide to Data Security in Communication Networks 1.17MB
Files
  1. 011 - 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 627.72MB
  2. 002 - Module introduction.mp4 12.37MB
  3. 003 - Learning objectives.mp4 45.14MB
  4. 004 - 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 393.02MB
  5. 005 - 1.2 Keyloggers and Spyware.mp4 65.93MB
  6. 006 - 1.3 Malware Analysis Techniques.mp4 105.55MB
  7. 007 - 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks.mp4 99.21MB
  8. 008 - 1.5 Surveying Common Application-based Vulnerabilities.mp4 170.42MB
  9. 009 - 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities.mp4 223.17MB
  10. 010 - 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 567.76MB
  11. 001 - CCNP and CCIE Security Core SCOR 350-701 - Introduction.mp4 92.82MB
  12. 012 - 1.9 Understanding Buffer Overflows.mp4 169.00MB
  13. 013 - 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 104.30MB
  14. 014 - 1.11 Understanding Security Threats in Cloud Environments.mp4 177.78MB
  15. 015 - 1.12 Understanding IoT Security Threats.mp4 294.08MB
  16. 016 - Learning objectives.mp4 20.74MB
  17. 017 - 2.1 Introducing Cryptography and Cryptanalysis.mp4 48.54MB
  18. 018 - 2.2 Understanding Encryption Protocols.mp4 120.25MB
  19. 019 - 2.3 Describing Hashing Algorithms.mp4 93.67MB
  20. 020 - 2.4 Introducing Public Key Infrastructure (PKI).mp4 150.07MB
  21. 021 - 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 134.82MB
  22. 022 - 2.6 Surveying SSL and TLS Implementations.mp4 133.78MB
  23. 023 - 2.7 Surveying IPsec Implementations.mp4 370.66MB
  24. 024 - Module introduction.mp4 13.48MB
  25. 025 - Learning objectives.mp4 26.01MB
  26. 026 - 3.1 Introducing SDN.mp4 124.73MB
  27. 027 - 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 86.91MB
  28. 028 - 3.3 Introducing Cisco ACI.mp4 150.75MB
  29. 029 - 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 195.88MB
  30. 030 - 3.5 Understanding VXLAN and Network Overlays.mp4 87.21MB
  31. 031 - 3.6 Understanding Microsegmentation.mp4 66.69MB
  32. 032 - 3.7 Surveying Open Source SDN Solutions.mp4 78.69MB
  33. 033 - 3.8 Understanding the Threats Against SDN Solutions.mp4 66.28MB
  34. 034 - 3.9 Understanding the Security Benefits in SDN Solutions.mp4 62.50MB
  35. 035 - Learning objectives.mp4 31.93MB
  36. 036 - 4.1 Introducing Network Programmability.mp4 272.55MB
  37. 037 - 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 35.82MB
  38. 038 - 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 343.94MB
  39. 039 - 4.4 A Brief Introduction to Git.mp4 190.97MB
  40. 040 - 4.5 Exploring pxGrid.mp4 140.43MB
  41. 041 - 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 92.26MB
  42. 042 - Module introduction.mp4 14.83MB
  43. 043 - Learning objectives.mp4 30.20MB
  44. 044 - 5.1 Understanding Authentication.mp4 236.79MB
  45. 045 - 5.2 Exploring the RADIUS Protocol.mp4 91.65MB
  46. 046 - 5.3 Surveying the TACACS+ Protocol.mp4 62.30MB
  47. 047 - 5.4 Understanding Authorization.mp4 68.73MB
  48. 048 - 5.5 Surveying Authorization Models.mp4 135.98MB
  49. 049 - 5.6 Defining Accounting.mp4 54.33MB
  50. 050 - 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 200.74MB
  51. 051 - 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 55.54MB
  52. 052 - 5.9 Understanding Cisco DUO.mp4 92.88MB
  53. 053 - 5.10 Introducing Cisco ISE.mp4 106.68MB
  54. 054 - 5.11 Understanding Cisco ISE Profiling Services.mp4 57.10MB
  55. 055 - 5.12 Understanding ISE Identity Services.mp4 93.33MB
  56. 056 - 5.13 Describing ISE Authorization Rules.mp4 76.24MB
  57. 057 - Learning objectives.mp4 48.24MB
  58. 058 - 6.1 Defining Network Visibility and Segmentation.mp4 50.85MB
  59. 059 - 6.2 Introducing NetFlow and IPFIX.mp4 56.42MB
  60. 060 - 6.3 Describing Flexible NetFlow Records.mp4 92.08MB
  61. 061 - 6.4 Understanding NetFlow Deployment.mp4 99.49MB
  62. 062 - 6.5 Exploring Cisco Stealthwatch.mp4 41.38MB
  63. 063 - 6.6 Deploying Cisco Stealthwatch Cloud.mp4 61.91MB
  64. 064 - 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 21.92MB
  65. 065 - 6.8 Exploring the Cisco TrustSec Solution.mp4 86.27MB
  66. 066 - 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 42.91MB
  67. 067 - 6.10 Introducing Network Segmentation.mp4 45.95MB
  68. 068 - 6.11 Exploring Application-based Segmentation.mp4 46.15MB
  69. 069 - 6.12 Understanding Cisco ACI.mp4 56.44MB
  70. 070 - 6.13 Describing Network Access with CoA.mp4 41.18MB
  71. 071 - 6.14 Integrating Different Security Systems Using pxGrid.mp4 89.01MB
  72. 072 - 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid.mp4 156.58MB
  73. 073 - Module introduction.mp4 16.36MB
  74. 074 - Learning objectives.mp4 29.66MB
  75. 075 - 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 101.45MB
  76. 076 - 7.2 Configuring and Verifying Port Security.mp4 102.06MB
  77. 077 - 7.3 Configuring and Verifying DHCP Snooping.mp4 96.69MB
  78. 078 - 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 120.12MB
  79. 079 - 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 145.70MB
  80. 080 - 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 55.26MB
  81. 081 - 7.7 Understanding and Configuring CDP_LLDP.mp4 76.95MB
  82. 082 - 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 118.65MB
  83. 083 - 7.9 Exploring How to Secure the Management Plane.mp4 113.37MB
  84. 084 - 7.10 Exploring How to Secure the Control Plane.mp4 112.54MB
  85. 085 - 7.11 Exploring How to Secure the Data Plane.mp4 99.97MB
  86. 086 - Learning objectives.mp4 39.01MB
  87. 087 - 8.1 Introducing Cisco Next-Generation Firewalls.mp4 129.00MB
  88. 088 - 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 370.40MB
  89. 089 - 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 198.77MB
  90. 090 - 8.4 Implementing Access Control Policies.mp4 50.91MB
  91. 091 - Learning objectives.mp4 16.11MB
  92. 092 - 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 175.52MB
  93. 093 - 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities.mp4 55.86MB
  94. 094 - 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 120.95MB
  95. 095 - Module introduction.mp4 11.46MB
  96. 096 - Learning objectives.mp4 18.75MB
  97. 097 - 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 121.61MB
  98. 098 - 10.2 Configuring IPsec Site-to-site VPNs.mp4 37.68MB
  99. 099 - 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 77.94MB
  100. 100 - 10.4 Exploring DMVPN.mp4 147.43MB
  101. 101 - 10.5 Understanding GET VPN.mp4 121.26MB
  102. 102 - 10.6 Deploying FlexVPN.mp4 161.16MB
  103. 103 - 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 98.84MB
  104. 104 - Learning objectives.mp4 22.05MB
  105. 105 - 11.1 Introducing Remote Access VPNs.mp4 26.98MB
  106. 106 - 11.2 Exploring Clientless Remote Access VPNs.mp4 98.54MB
  107. 107 - 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 88.25MB
  108. 108 - 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 111.05MB
  109. 109 - 11.5 Troubleshooting Remote Access VPN Implementations.mp4 36.14MB
  110. 110 - Module introduction.mp4 17.25MB
  111. 111 - Learning objectives.mp4 31.03MB
  112. 112 - 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 97.42MB
  113. 113 - 12.2 Surveying Patch Management in the Cloud.mp4 58.88MB
  114. 114 - 12.3 Performing Security Assessments in Cloud Environments.mp4 101.26MB
  115. 115 - 12.4 Introducing Agile, DevOps, and CI_CD Pipelines.mp4 193.03MB
  116. 116 - 12.5 Introducing Serverless Computing.mp4 28.78MB
  117. 117 - 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 47.52MB
  118. 118 - 12.7 Exploring the Concepts of DevSecOps.mp4 106.53MB
  119. 119 - 12.8 Surveying Cisco Umbrella.mp4 118.51MB
  120. 120 - 12.9 Exploring Cisco Cloud Email Security.mp4 43.33MB
  121. 121 - 12.10 Exploring Cisco Cloudlock.mp4 102.30MB
  122. 122 - Learning objectives.mp4 35.34MB
  123. 123 - 13.1 Introducing Cisco Content Security Solutions.mp4 100.28MB
  124. 124 - 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 71.42MB
  125. 125 - 13.3 Introduction to Cisco Email Security.mp4 111.05MB
  126. 126 - 13.4 Exploring the Cisco ESA Deployment Model.mp4 36.87MB
  127. 127 - 13.5 Understanding Email Security Features.mp4 73.96MB
  128. 128 - 13.6 Discussing Email Security in the Cloud.mp4 72.92MB
  129. 129 - 13.7 Introduction to Secure Internet Gateway (SIG).mp4 50.34MB
  130. 130 - 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 83.44MB
  131. 131 - 13.9 Exploring Cisco Umbrella Investigate.mp4 93.94MB
  132. 132 - Module introduction.mp4 9.83MB
  133. 133 - Learning objectives.mp4 43.81MB
  134. 134 - 14.1 Introducing AMP for Endpoints.mp4 63.03MB
  135. 135 - 14.2 Describing AMP for Endpoints Outbreak Control.mp4 132.04MB
  136. 136 - 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 61.84MB
  137. 137 - 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 53.04MB
  138. 138 - 14.5 Exploring Application Control in AMP for Endpoints.mp4 34.02MB
  139. 139 - 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 92.83MB
  140. 140 - 14.7 Introduction to AMP for Endpoints Policies.mp4 12.49MB
  141. 141 - 14.8 Describing the Anyconnect AMP Enabler.mp4 7.08MB
  142. 142 - 14.9 Exploring AMP for Endpoints Engines.mp4 25.35MB
  143. 143 - 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 63.13MB
  144. 144 - 14.11 Introducing the Cisco Threat Response Solution.mp4 78.40MB
  145. 145 - CCNP and CCIE Security Core SCOR 350-701 - Summary.mp4 51.30MB