Companies Home Search Profile

CCIE Security v6.0

Focused View

196:09:45

137 View
    1-Introduction
  • 1-Course Introduction.mp4
    03:35
    2-Exam Information
  • 1-CCIE Security v6 Exam.mp4
    27:28
    3-Study And Preparation Resources
  • 1-Recommended Study Approach.mp4
    14:17
  • 2-Recommended Reading.mp4
    18:16
  • 3-Other Resources.mp4
    10:40
    4-Lab Strategy
  • 1-Design.mp4
    15:13
  • 2-Deploy, Operate and Optimize.mp4
    27:09
    5-Course Conclusion
  • 1-Course Conclusion.mp4
    01:09
    1-Layer 2 Technologies for Beginners
      1-Introdution
    • 1-Course Introduction.mp4
      02:04
      2-Introduction to Ethernet
    • 1-Ethernet.mp4
      20:00
      3-LAN Fundamentals
    • 1-LAN Switching Concepts.mp4
      13:47
    • 2-VLANs And Trunking.mp4
      47:19
    • 3-VLAN Trunking Protocol (VTP).mp4
      36:36
      4-Spanning Tree Protocol
    • 1-Spanning Tree Protocol (STP).mp4
      51:19
    • 2-Optional STP Features.mp4
      17:29
    • 3-Optional STP Features.mp4
      28:13
      5-Advanced LAN Concepts
    • 1-EtherChannel.mp4
      34:10
    • 2-Switch Stacking, Chassis Aggregation.mp4
      09:43
    2-Routing Technologies for Beginners
      1-Introduction
    • 1-Course Introduction.mp4
      01:50
      2-Introduction to IP Routing
    • 1-IP Routing.mp4
      41:53
      3-Routing Protocols
    • 1-The RIPv2 Protocol.mp4
      34:59
    • 2-The EIGRP Protocol.mp4
      01:02:43
    • 3-The EIGRPv6 Protocol.mp4
      22:34
    • 4-The OSPF Protocol.mp4
      27:08
    • 5-The OSPFv3 Protocol.mp4
      23:44
    • 6-The BGP Protocol.mp4
      26:16
    1-IOS Firewall
      1-Course Overview
    • 1-Course Introduction.mp4
      08:55
      2-Access Lists
      3-DoS And DDoS Mitigation
    • 2-DoS And DDoS Attacks - Ciscos Guide to DDoS Defense.mp4
      28:45
    • 3-DoS And DDoS Attacks - Evolution.mp4
      13:16
    • 4-IP Address Spoofing.mp4
      28:49
    • 5-Unicast RPF.mp4
      22:02
    • 6-Strict uRPF.mp4
      22:47
    • 7-Advanced uRPF.mp4
      14:53
    • 8-uRPF Troubleshooting.mp4
      12:42
    • 9-Remotely Triggered Black Hole Filtering (RTBH).mp4
      28:09
    • 10-Source Based RTBH.mp4
      15:33
    • 11-ICMP Attacks - Overview.mp4
      21:54
    • 12-ICMP Attacks - Mitigation.mp4
      19:10
    • 13-UDP Attacks.mp4
      25:54
    • 14-TCP Attacks.mp4
      19:11
    • 15-TCP Intercept - Overview.mp4
      23:53
    • 16-TCP Intercept - Overview.mp4
      27:23
    • 17-Fragmentation Attacks - Overview.mp4
      24:05
    • 18-Fragmentation Attacks - Overview.mp4
      30:55
    • 19-Fragmentation Attack Protection with ACL.mp4
      29:57
    • 20-Frangment Filtering via ACL.mp4
      29:21
    • 21-Virtual Fragmentation Reassembly (VFR) - Implementation.mp4
      22:40
    • 21-Virtual Fragmentation Reassembly (VFR) - Overview.mp4
      14:13
      4-Zone Based Policy Firewall
    • 1-ZBFW - Overview.mp4
      26:58
    • 2-ZBFW Building Blocks - Command Syntax.mp4
      32:26
    • 3-ZBFW Building Blocks - Layer 3-4 Policy-Maps.mp4
      35:36
    • 4-ZBFW Basic Policy Implementation - Overview.mp4
      27:51
    • 5-ZBFW Basic Policy Implementation - Configuration.mp4
      32:41
    • 6-ZBFW Traffic Policing.mp4
      13:57
    • 7-ZBFW TCP Inspection.mp4
      18:05
    • 8-ZBFW TCP OoO Packet.mp4
      18:32
    • 9-ZBFW UDP Inspection.mp4
      18:47
    • 10-ZBFW ICMP Inspection.mp4
      30:52
    • 11-Tuning TCP Connection Settings.mp4
      24:06
    • 12-ZBFW TCP Reset Segment Control.mp4
      05:49
    • 13-ZBFW TCP Window Scaling.mp4
      09:14
    • 14-ZBFW Tuning UDP And ICMP Connection Settings.mp4
      11:52
    • 15-ZBFW with ACL.mp4
      17:41
    2-ASA Firewall
      1-Overview
    • 1-Course Introduction.mp4
      03:43
      2-Basic Setup on ASA
    • 1-Configuring IP Addressing on ASA.mp4
      01:30
    • 2-Configuring Nameif And Security Levels on ASA.mp4
      01:51
      3-Routing Protocol
    • 1-Configuring Static Routes on ASA.mp4
      02:53
    • 2-Configuring EIGRP on ASA.mp4
      04:11
    • 3-Control Plane Authentication in EIGRP.mp4
      03:52
    • 4-Configuring OSPF on ASA.mp4
      04:21
    • 5-Control Plane Authentication in OSPF.mp4
      04:57
      4-Management Access Setup
    • 1-Management Access to ASA.mp4
      03:08
      5-ACL, Objects And Object-Groups
    • 1-Configuring Objects, Object-Group And ACL.mp4
      10:26
      6-NAT
    • 1-Configuring Dynamic NAT.mp4
      12:09
    • 2-Configuring Dynamic PAT.mp4
      03:35
    • 3-Configuring Static NAT And Static PAT.mp4
      05:21
    • 4-Configuring Twice NAT.mp4
      03:46
      7-Policy Maps And Class Maps
    • 1-BGP Through ASA.mp4
      09:50
      8-Transparent Firewall
    • 1-Bridging Vlans using Transparent ASA.mp4
      04:22
      9-Multi-Context
    • 1-Creating Virtual Firewalls.mp4
      09:56
      10-Failover
    • 1-Active-Standby And Active-Active.mp4
      08:23
      11-Clustering
    • 1-Clustering.mp4
      20:04
    3-Perimeter Security
      1-Introduction
    • 1-Instructor Introduction.mp4
      01:20
      2-IOS Firewall Technologies
    • 1-Firewall Technologies.mp4
      19:20
    • 2-Access Lists.mp4
      33:49
    • 3-Zone-Based Firewall (ZFW).mp4
      28:34
    • 4-Implementing ZFW.mp4
      20:55
    • 5-IOS Network Address Translation (NAT).mp4
      28:39
    • 6-NAT for IPv6.mp4
      44:02
      3-Basic ASA Technologies
    • 1-Cisco ASA Firewall Fundamentals.mp4
      15:20
    • 2-Redundant Interfaces.mp4
      13:47
    • 3-EtherChannels.mp4
      08:25
    • 4-ASA Routing Overview.mp4
      17:31
    • 5-ASA Routing - EIGRP.mp4
      09:19
    • 6-ASA Routing - EIGRP.mp4
      17:13
    • 7-ASA Routing - BGP.mp4
      11:17
    • 8-ASA Management.mp4
      07:01
    • 9-Implementing Management Access.mp4
      06:57
    • 10-Traffic Filtering And Control.mp4
      11:10
    • 11-Implementing Traffic Filtering.mp4
      14:16
    • 12-ASA Network Address Translation (NAT).mp4
      24:49
    • 13-ASA Network Address Translation (NAT).mp4
      18:31
      4-Advanced ASA Technologies
    • 1-ASA Modes of Operations.mp4
      15:15
    • 2-Implementing Transparent ASA.mp4
      17:29
    • 3-Implementing Security Contexts.mp4
      19:05
    • 4-Modular Policy Framework (MPF) Overview.mp4
      14:05
    • 5-Implementing MPF.mp4
      17:38
    • 6-ASA High Availability - Failover.mp4
      08:15
    • 7-Failover - Active Standby.mp4
      24:01
    • 8-Failover - Active Active.mp4
      22:43
    • 9-Clustering Overview.mp4
      14:26
    • 10-Clustering - Basic Operations.mp4
      19:02
    • 11-Clustering - Deployment Modes.mp4
      16:28
    • 12-Implementing L3 Clustering.mp4
      27:16
    • 13-Implementing L2 Clustering.mp4
      29:52
    4-FTD Next Generation Firewall
  • Exercise Files.zip
    • 1-Firepower Threat Defense Basics
    • 1-Introduction to Firepower Systems.mp4
      17:54
    • 2- Managing FTD.mp4
      21:03
    • 3-The Registration.mp4
      14:18
    • 4-Troubleshooting FTD.mp4
      11:18
    • 5-FTD Objects.mp4
      08:49
    • 6-Deployment Modes.mp4
      24:01
    • 7-FTD Initialization Routing.mp4
      17:15
    • 8-FTD Policies Overview.mp4
      18:40
      2-Policies Features
    • 1-Access Control Policy (ACP).mp4
      32:28
    • 2-Special Policies.mp4
      36:28
    • 3-Security Intelligence (SI).mp4
      27:00
    • 4- URL Filtering.mp4
      25:51
    • 5-Network Discovery.mp4
      18:26
    • 6-File Policy.mp4
      25:52
    • 7- SSL Policy.mp4
      27:26
      3-Threat Prevention
    • 1-Introduction to Next Generation IPS (NGIPS).mp4
      12:08
    • 2-Snort Variables Rules.mp4
      23:08
    • 3-Implementing NGIPS.mp4
      28:22
    5-Firepower Threat Defense (FTD) - Part I
  • firepower.pdf
    • 1-Firepower Threat Defense
    • 1-Course Introduction.mp4
      21:41
    • 2-Packet Flow - Overview.mp4
      14:44
      2-Firepower Managent Center (FMC)
    • 1-Installing a Cisco Firepower Managent Center (FMC) - Part 1.mp4
      05:40
    • 2-Installing a Cisco Firepower Managent Center (FMC) - Part 2.mp4
      07:51
      3-Configuring the FMC
    • 1-System Configuration.mp4
      16:13
    • 2-Health Policies And Health Alerts.mp4
      08:47
      4-Installing FTD
    • 1-Installing FTD on a Cisco 5500-x - Part 1.mp4
      12:33
    • 2-Installing FTD on a Cisco 5500-x - Part 2.mp4
      16:38
      5-Cisco FTD 41009300
    • 1-FXOS And Chassis Manager.mp4
      13:49
      6-Firepower Logical Objects
    • 1-Firepower-FTD Objects - Part 1.mp4
      19:31
    • 2-Firepower-FTD Objects - Part 2.mp4
      23:33
      7-Configuring FTD
    • 1-FTD Interface Configuration - Part 1.mp4
      13:23
    • 2-FTD Interface Configuration - Part 2.mp4
      04:00
    • 3-FTD Routing Configuration.mp4
      11:22
    • 4-FTD Platform Settings.mp4
      27:52
      8-Configuring Policies
    • 1-Access Control Policy - Part 1.mp4
      17:58
    • 2-Access Control Policy - Part 2.mp4
      20:59
    • 3-Access Control Policy - Part 3.mp4
      32:53
    • 4-FTD PreFilter.mp4
      12:58
    • 5-Network Address Translation (NAT).mp4
      20:48
    • 6-Malware And File Policy.mp4
      21:34
    • 7-IPS Policy - Part 1.mp4
      14:31
    • 8-IPS Policy - Part 2.mp4
      28:11
      9-Discovering Users, Hosts And Aplications
    • 1-Firepower Network Discovery.mp4
      18:42
    • 2-Reporting And Task Management.mp4
      21:10
      10-Turning Your System
    • 1-Network Analysis - Part 1.mp4
      17:07
    • 2-Network Analysis - Part 2.mp4
      19:27
    • 3-Network Analysis - Part 3.mp4
      23:50
      11-Managing Administrators
    • 1-User Account Managment.mp4
      16:49
      12-Connecting the FMC to Your AD
    • 1-Identity Policy.mp4
      14:49
    6-Firepower Threat Defense (FTD) - Part II
      1-Introduction
    • 1-Course Introduction.mp4
      03:20
      2-Advanced Management And HA
    • 1-External Authentication with RADIUS - Overview.mp4
      05:11
    • 2-External Authentication with RADIUS - Configuration.mp4
      30:13
    • 3-FlexConfig - Overview.mp4
      11:51
    • 4-FlexConfig - Configuration.mp4
      28:49
    • 5-High Availability.mp4
      17:41
      3-Advanced Policies
    • 1-SSL Policy - Overview.mp4
      19:30
    • 2-SSL Policy - Configuration.mp4
      18:04
    • 3-Quality of Service (QoS).mp4
      07:35
    • 4-Correlation Policy.mp4
      26:40
      4-Virtual Private Networks
    • 1-FTD VPN.mp4
      07:03
    • 2-Site-to-Site IPsec IKEv1.mp4
      17:36
    • 3-Remote Access SSL-TLS.mp4
      26:16
    1-CryptographyAndPKI
  • Course Introduction.pdf
  • Cryptography and PKI.pdf
    • 1-Introduction
    • 1-Course Introduction.mp4
      09:18
      2-Cryptography
    • 1-Introduction to Cryptography.mp4
      13:19
    • 2-Hashing.mp4
      20:44
    • 3-Symmetric Encryption.mp4
      22:56
    • 4- Asymmetric Encryption.mp4
      12:46
    • 5-Digital Signatures.mp4
      11:11
    • 6-Next Generation Encryption.mp4
      18:01
      3-Public Key Infrastructure (PKI)
    • 1- Public Key Infrastructure.mp4
      21:49
    • 2- Enrollment Revocation.mp4
      14:17
    • 3-PKI Architectures.mp4
      13:54
    • 4-Implementing PKI.mp4
      29:32
    • 5-ASA PKI.mp4
      11:38
    2-IKEv1 IPsec VPN
  • Course Introduction - IKEv1 IPsec VPN.output.pdf
  • IKEv1 IPsec VPN.output.pdf
    • 1-Overview
    • 1-Course Introduction.mp4
      03:26
      1. Instructor Demo Configs
        MODULE 1
          FINAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
          INITIAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        MODULE 5
          FINAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
          INITIAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        MODULE 6
          FINAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
          INITIAL
        • ASA1.txt
        • R1.txt
        • R2.txt
        • SW1.txt
      2-Virtual Private Networks
    • 1-VPNs, Tunneling GRE.mp4
      24:08
      3-IKEv1 IPsec Fundamentals
    • 1-IPsec Overview.mp4
      31:43
    • 2- IPsec Tunneling.mp4
      12:29
    • 3-IPsec on the ASA.mp4
      15:04
    • 4-Implementing L2L IPsec VPN - IOS-ASA.mp4
      22:22
      4-IPsec Advanced
    • 1- IOS Advanced IPsec Solutions.mp4
      30:21
    • 2-IPsec IPv6.mp4
      07:49
      Topology
    • ikev1 ipsec topo ipv4.zip
    3-Dynamic Multipoint VPN (DMVPN)
      1-Course Overview
    • 1-Course Introduction.mp4
      04:11
      2-Dynamic Multipoint VPN (DMVPN)
    • 1-DMVPN - Overview.mp4
      17:42
    • 2-DMVPN - Routing.mp4
      24:55
    • 3-DMVPN - Phase I.mp4
      16:48
    • 4-Implementing DMVPN - Phase I.mp4
      41:45
    • 5-DMVPN - Phase II.mp4
      12:18
    • 6-Implementing DMVPN - Phase II.mp4
      25:17
    • 7-DMVPN - Phase III.mp4
      17:02
    • 8-Implementing DMVPN - Phase III.mp4
      13:40
    • 9-DMVPN And IPv6.mp4
      08:50
    • 10-Implementing IPv6 DMVPN.mp4
      19:03
    • 11-DMVPN Dual Hub.mp4
      15:28
    • 12-Implementing DMVPN Dual Hub.mp4
      19:30
    4-Group Encrypted Transport VPN (GETVPN)
      1-Overview
    • 1-Course Introduction.mp4
      04:50
      2-GETVPN Basics
    • 1-GETVPN Overview.mp4
      22:54
    • 2-Implementing GETVPN.mp4
      39:35
    • 3-GETVPN for IPv6.mp4
      23:14
      3-GETVPN Advanced
    • 1-COOP KS.mp4
      37:48
    • 2-G-IKEv2.mp4
      30:21
    5-Secure Connectivity
      1-Cryptography Public Key Infrastructure
    • 1-Cryptography Basics.mp4
      31:18
    • 2-Public Key Infrastructure (PKI).mp4
      40:44
    • 3-PKI Configuration.mp4
      27:28
      2-Virtual Private Networks IP Security
    • 1-Virtual Private Network (VPN) And IPsec.mp4
      48:55
    • 2-IPsec on the ASA.mp4
      13:55
    • 3-IPsec VPN - L2L IOS-ASA.mp4
      39:24
    • 4-IPsec VPN - L2L Digital Certificates.mp4
      25:02
    • 5-ASA Certificate Maps.mp4
      12:39
    • 6-IOS Advanced IPsec Solutions.mp4
      52:44
    • 7-IPsec for IPv6.mp4
      39:04
    • 8-VRF-Aware IPsec.mp4
      31:19
      3-IKE version 2
    • 1-IKE Version 2 Overview.mp4
      15:11
    • 2-Cisco FlexVPN.mp4
      42:10
    • 4-Cisco FlexVPN - Client-Server.mp4
      38:20
      4-SSLTLS VPNs
    • 1-The SSL And TLS Protocols.mp4
      19:34
    • 2-Remote Access VPN - SSL-TLS.mp4
      14:40
    • 3-Cisco AnyConnect.mp4
      03:37
    • 4-ASA Clientless SSL VPN.mp4
      15:48
    • 5-ASA AnyConnect SSL VPN.mp4
      14:36
    • 6-IOS SSL VPN.mp4
      13:41
      5-Dynamic Multipoint VPN
    • 1-Introduction to DMVPN.mp4
      41:49
    • 2-Implementing DMVPN.mp4
      49:36
    • 3-DMVPN for IPv6.mp4
      42:12
    • 4-DMVPN - Dual Hub.mp4
      10:48
      6-Group Encrypted Transport VPN
    • 1-Introduction to GETVPN.mp4
      30:42
    • 2-Implementing GETVPN.mp4
      37:23
    • 3-GETVPN for IPv6.mp4
      15:15
    • 4-GETVPN - G-IKEv2.mp4
      19:59
    1-Network Management Security
      1-Overview
    • 1-Course Introduction.mp4
      01:58
      2-Secure Network Management
    • 1-Securing Administrative Access - Part 1.mp4
      25:13
    • 2-Securing Administrative Access - Part 2.mp4
      15:36
    • 3-Role-Based CLI Access.mp4
      20:02
    • 4-Logging.mp4
      13:43
      3-Hardening Management Protocols
    • 1-Securing SNMP.mp4
      21:45
    • 2-Securing NTP.mp4
      24:20
    2-Routing Protocol Security
  • Exercise Files.zip
    • 1-Overview
    • 1- Course Introduction.mp4
      01:57
      1. Instructor Demo Configs
        M1 NOT NEEDED
          FINAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 2
          FINAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 3
          FINAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 4
          FINAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • CSR1.txt
        • CSR2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
      2-Routing Protocol Security Basics
    • 1- Routing Protocol Authentication.mp4
      19:35
      3-Routing Protocol Hardening
    • 1-Securing EIGRP.mp4
      27:40
    • 2-Securing OSPF.mp4
      30:39
    • 3-Securing BGP.mp4
      25:17
    3-Layer 2 Security
  • L2 Security.pdf
  • l2 security topo.zip
    • 1-Introduction
    • 1-Course Introduction.mp4
      02:22
      1. Instructor Demo Configs
        MODULE 1
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 2
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 3
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 4
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 5
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        MODULE 6
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
      2-L2 Attacks Mitigation
    • 1-Securing Switching.mp4
      31:40
    • 2-Protecting STP.mp4
      17:32
    • 3-Securing DHCP.mp4
      27:44
    • 4-Preventing Spoofing.mp4
      27:23
      3-L2 Security Features
    • 1-Private VLANs.mp4
      28:38
    • 2-Port-based Traffic Control.mp4
      16:44
      Task And Solution Configs
        TASK 1
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        TASK 2
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        TASK 3
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        TASK 4
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        TASK 5
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
        TASK 6
          FINAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
          INITIAL
        • ASA1.txt
        • ASA2.txt
        • R1.txt
        • R2.txt
        • SW1.txt
        • SW2.txt
    4-Infrastructure Security
      1-Introduction
    • 1-Instructor Introduction.mp4
      01:19
      2-Securing the Control Plane
    • 1-Network Device Architecture.mp4
      06:25
    • 2-Routing Protocol Authentication.mp4
      12:11
    • 3-Implementing Routing Protocol Authentication.mp4
      10:11
    • 4-Route Filtering.mp4
      08:58
    • 5-Control Plane Policing.mp4
      14:47
    • 6-Control Plane Protection.mp4
      15:06
    • 7-Implementing Control Plane Protection.mp4
      14:37
    • 8-Basic CPU Protection Mechanisms.mp4
      09:54
    • 9-Basic Memory Protection Mechanisms 2017.mp4
      07:40
      3-Securing the Management Plane
    • 1-Secure Network Management.mp4
      38:28
    • 2-Management Plane Protection.mp4
      04:44
    • 3-SNMP, NTP And Logging.mp4
      49:55
    • 4-The DHCP Protocol.mp4
      17:05
    • 5-DHCPv6.mp4
      11:42
    • 6-The DNS Protocol.mp4
      20:43
      4-Network Attacks Mitigation
    • 1-IP Spoofing Attacks.mp4
      10:57
    • 2-Mitigation Tools ACLs.mp4
      33:49
    • 3-Mitigation Tools URPF.mp4
      29:17
    • 4-DoS Attacks.mp4
      10:49
    • 5-Mitigation Tools - TCP Intercept.mp4
      19:23
    • 6-Mitigation Tools - Policing.mp4
      07:48
    • 7-Mitigation Tools - RTBH.mp4
      26:39
    • 8-IP Options And Security.mp4
      10:22
    • 9-IP Options - Attack Mitigation.mp4
      09:47
    • 10-IP Fragmentation.mp4
      12:13
    • 11-IP Fragmentation - Attack Mitigation.mp4
      12:11
    • 12-NBAR And NBAR2.mp4
      21:47
      5-Securing IPv6
    • 1-IPv6 Extension Headers.mp4
      08:54
    • 2-Extension Headers Processing And Security.mp4
      11:28
    • 3-Extension Headers - Attacks Mitigation.mp4
      26:22
    • 4-IPv6 Fragmentation.mp4
      17:56
    • 5-IPv6 Fragmentation Attacks Mitigation.mp4
      18:20
    • 6-Neighbor Discovery.mp4
      11:56
    • 7-Neighbor Discovery Messages.mp4
      17:10
    • 8-Secure Neighbor Discovery (SEND) Introduction.mp4
      13:46
    • 9-SEND Operations.mp4
      20:46
    • 10-SEND Configuration.mp4
      32:04
      6-Securing Layer 2
    • 1-Discovery Protocols.mp4
      25:07
    • 2-VLANs And Trunking.mp4
      20:14
    • 3-Spanning Tree Protocol (STP).mp4
      29:22
    • 4-STP Security Features - Part I.mp4
      17:30
    • 5-STP Security Features - Part II.mp4
      20:43
    • 6-Layer 2 Security - Part I.mp4
      45:22
    • 7-Layer 2 Security - Part II.mp4
      45:01
    • 8-Private VLANs And Protected Ports.mp4
      19:03
    • 9-Storm Control.mp4
      04:49
      7-Securing Wireless Networks
    • 1-Wireless Basics.mp4
      19:59
    • 2-Wireless Security.mp4
      15:32
      8-Security Best Practices
    • 1-Device Hardening - ASA.mp4
      11:42
    • 2-Device Hardening - IOS.mp4
      11:27
    • 3-Cisco SAFE.mp4
      07:38
    5-IPv6 First Hop Security vSeminar
  • 1-IPv6 First Hop Security - Part 1.mp4
    39:25
  • 2-IPv6 First Hop Security - Part 2.mp4
    38:47
  • 3-IPv6 First Hop Security - Part 3.mp4
    13:51
    6-Security with StealthWatch using NetFlow
      1-Stealthwatch Introduction
    • 1-Introduction to Stealthwatch.mp4
      27:34
    • 2-Basic Stealthwatch System Installation - Part 1.mp4
      29:08
    • 3-Basic Stealthwatch System Installation - Part 2.mp4
      15:39
      2-Understanding SMC
    • 1-SMC Configuration.mp4
      24:18
      3-Classifying Known and Unknown Network Entities
    • 1-Host Groups and User Management.mp4
      30:17
    • 2-Classification of Customer Environment.mp4
      22:05
      4-Security and System Maintenance
    • 1-Detecting Indicators of Compromise (IoC) - Part 1.mp4
      22:06
    • 2-Detecting Indicators of Compromise (IoC) - Part 2.mp4
      23:12
    • 3-SNMP, Storage, Backup And Upgrade.mp4
      25:13
    1-Identity Services Engine (ISE)
      1-Introduction
    • 1-Course Introduction.mp4
      03:08
      2-ISE Basics
    • 1-Introduction to Cisco ISE.mp4
      19:44
    • 2-The Policies.mp4
      47:31
    • 3-Integrating with Active Directory.mp4
      03:41
      3-Access Control - Administration
    • 1-Authentication, Authorization Accounting (AAA) Overview.mp4
      21:47
    • 2-AAA Components Configuration.mp4
      32:57
    • 3-Introduction to Cisco Access Control Server (ACS).mp4
      23:14
    • 4-Introduction to Cisco Identity Services Engine (ISE).mp4
      11:51
    • 5- AD Integration.mp4
      05:18
    • 6-ISE Policies.mp4
      32:43
    • 7-Administrative Access - ISE.mp4
      41:12
    • 8-Administrative Access - ACS.mp4
      18:57
      • main
      • 1-AAA Overview.mp4
        16:47
      • 2-AAA Components And Configuration.mp4
        32:30
      • 3-Controlling Administrative Access.mp4
        37:36
      4-Access Control Network
    • 1-Introduction to Profiling.mp4
      37:08
    • 2-Change of Authorization (CoA).mp4
      11:20
    • 3-Profiling Probes.mp4
      19:10
    • 4-Enabling Profiling.mp4
      15:55
    • 5-802.mp4
      25:02
    • 6-802.1x Deployment Modes.mp4
      17:32
    • 7-Implementing Wired 802.mp4
      46:29
    • 8-Implementing Wireless 802.mp4
      17:30
    • 9-Guest Services.mp4
      14:40
      5-Scaling ISE Deployments
    • 1-Distributed ISE.mp4
      23:20
    • 2-Deploying ISE Multinode.mp4
      19:44
      6-conclusion
    • 1-Course Conclusion.mp4
      01:05
    2-Advanced Identity Services Engine (ISE)
      1-course intro
    • 1-Course Introduction.mp4
      02:38
      2-common confguration
    • 1-AD Integration.mp4
      22:29
    • 2-EAP Chaining.mp4
      41:04
    • 3-Advanced Profiling.mp4
      41:38
    • 4-Certificate Services.mp4
      20:01
      3-context sharing
    • 1-ISE And WSA - pxGrid.mp4
      50:24
    • 2-ISE And FTD - pxGrid.mp4
      51:01
    3-TrustSec
      1-Introduction
    • 1-Course Introduction.mp4
      02:32
      2-TrustSec Overview And Operations
    • 1-Introduction to TrustSec.mp4
      24:54
    • 2-Classification And SGT.mp4
      15:37
    • 3-Propagation And SXP.mp4
      45:56
    • 4-Enforcement And SGACL.mp4
      16:28
      3-Implementing TrustSec
    • 1-TrustSec on IOS.mp4
      51:53
    • 2-TrustSec on ASA.mp4
      23:08
    • 3-TrustSec for Wireless Networks.mp4
      14:17
    1-Network Programmability Foundation
  • Network Programmability Foundation.pdf
    • 1-Course Introduction
    • 1-Course Introduction.mp4
      02:42
      2-Programmability Overview
    • 1-Introduction to Network Programmability Foundation.mp4
      26:33
    • 2-Automation Tools.mp4
      19:37
    • 3-Version Control with Git.mp4
      33:40
    • 4-Distributed Git and GitHub.mp4
      12:39
      3-Python Programming Basics
    • 1-introduction to Python.mp4
      32:38
    • 2-Basic Python Constructs.mp4
      38:53
    • 3-Data Types - Numbers.mp4
      09:01
    • 4-Data Types - Boolean.mp4
      07:23
    • 5-Data Types - String.mp4
      38:29
    • 6-Data Types - Dictionary.mp4
      15:52
    • 7-Conditionals.mp4
      25:31
    • 8-Loops.mp4
      21:14
    • 9-Functions.mp4
      20:34
    • 10-File Access.mp4
      21:03
    • 11-Classes.mp4
      19:57
    • 12-Modules and Packages.mp4
      16:44
      4-Data Formats
    • 1-Data Formats - JSON.mp4
      10:15
    • 2-Data Formats - XML.mp4
      24:07
    • 3-Data Formats - YAML.mp4
      11:48
      5-APIs
    • 1-Introduction to APIs.mp4
      14:33
    • 2-API Toolset.mp4
      22:20
    • 3-Python Automation with REST API.mp4
      23:28
      6-Course Conclusion
    • 1-Course Conclusion.mp4
      01:00
    2-cisco DNA
  • 1-The Cisco DNA Architecture.mp4
    07:48
  • 2-The Management Layer.mp4
    04:58
  • 3-Fabric Underlay Design Architecture Guidelines.mp4
    09:27
  • 4-Network Underlay Best Practices.mp4
    08:31
  • 5-Design Considerations for SD-Access Fabric Architecture.mp4
    06:06
  • 6-SD-Access Node Types.mp4
    07:39
  • 7-Campus Fabric Components.mp4
    05:05
  • 8-SD-Access Deployment Considerations.mp4
    08:44
  • 9-Fabric Deployment Models.mp4
    02:51
  • 10-DNAC Workflows, Device Discovery And LAN Automation.mp4
    12:50
  • 11-ISE Roles And DNAC Communication.mp4
    05:07
  • 12-ISE Standalone And Distributed Deployment.mp4
    03:16
  • 13-DNAC And ISE Integration.mp4
    05:08
    3-Intent-Based Networking
  • VOD-3568 SD-Access Software Defined Fundamentals.pdf
    • 1-Introduction
    • 1-Course Introduction.mp4
      02:03
      2-Why Study SD-Access
    • 1-Why Study SD-Access.mp4
      05:11
    • 2-The 2020 Global Networking Trends Report.mp4
      03:59
    • 3-The Future of Networking.mp4
      06:49
      3-Intent-Based Networking
    • 1-Introduction to Intent-Based Networking (IBN).mp4
      06:31
    • 2-IBN in a Nutshell.mp4
      06:40
    • 3-Demystifying Software Defined-Access.mp4
      05:26
    • 4-Defining SD-Access.mp4
      06:47
      4-The What, How and Why of SD-Access
    • 1-SD-Access And IBN.mp4
      03:59
    • 2-The What, How, and Why of SD-Access.mp4
      11:45
    • 3-Why Move to SD-Access.mp4
      08:58
      5-Overview of SD-Access Main Components
    • 1-Overview of SD-Access Main Components.mp4
      04:40
    • 2-Cisco ISE.mp4
      04:26
    • 3-The Overlay Fabric.mp4
      03:22
      6-Document Repository for SD-Access
    • 1-Document Repository for SD-Access.mp4
      08:41
    • 2-Hardware, Software, Licensing And Release Documentation.mp4
      02:10
    • 3-Exam-Related Documentation.mp4
      02:04
    • 4-How to Study for the CCIE.mp4
      03:23
      7-Introduction to the ISE Role
    • 1-Introduction to the ISE Role in the SD-Access Architectur.mp4
      06:45
    • 2-ISE Deployment Models.mp4
      05:50
    • 3-ISE Integration with SD-Access.mp4
      06:18
      8-Conclusion
    • 1-Course Conclusion.mp4
      05:11
    1-Email Security Appliance
      1-Overview
    • 1-Course Introduction.mp4
      02:42
      2-Introduction to Cisco ESA
    • 1-SMTP.mp4
      21:15
    • 2-ESA Overview.mp4
      11:24
    • 3-ESA Initialization - Part 1.mp4
      17:41
    • 4-ESA Initialization - Part 2.mp4
      18:33
    • 5-Email Pipeline.mp4
      10:25
    • 6-Access Tables - Part 1.mp4
      19:03
    • 7-Access Tables - Part 2.mp4
      19:36
      3-The Policies
    • 1-Introduction to Policies.mp4
      22:39
    • 2-ESA Policies - Part 1.mp4
      28:11
    • 3-ESA Policies - Part 2.mp4
      28:24
      4-Advanced ESA Features
    • 1-Message Filters.mp4
      15:59
    2-Web Security Appliance
      1-Overview
    • 1-Course Introduction.mp4
      03:49
    • 2-Introduction to the Web Security Appliance.mp4
      10:43
      2-Connect, Install, And Configure
    • 1-System Setup Wizard.mp4
      01:54
    • 2-Web Cache Communication Protocol (WCCP).mp4
      03:25
      3-URL Filtering
    • 1-Blocking Global URL Categories.mp4
      04:50
    • 2-Blocking Custom URLs.mp4
      06:01
      4-Protocols And User Agents
    • 1-Blocking Custom Browsers.mp4
      06:10
      5-Applications
    • 1-Blocking Applications.mp4
      03:09
      6-Objects
    • 1-Blocking Custom Objects.mp4
      02:52
      7-Command Line Interface
    • 1-WSA CLI.mp4
      01:56
      8-High Availability
    • 1-Failover.mp4
      08:16
      9-Anti-Malware And Reputation
    • 1-Web Reputation.mp4
      07:12
      10-Time Restrictions And Quotas
    • 1-Advanced Web Security.mp4
      06:29
      11-Integration with ISE
    • 1-PxGrid.mp4
      03:10
      12-Final Words from the Instructor
    • 1-Course Conclusion.mp4
      01:24
    3-Content Security
      1-Hypertext Transfer Protocol
    • 1-The HTTP Protocol.mp4
      16:27
      2-Web Security Appliance Basics
    • 1-Introduction to Cisco Web Security Appliance (WSA).mp4
      12:49
    • 2-Initializing WSA.mp4
      28:23
    • 3-WSA Modes.mp4
      40:38
      3-Web Security Appliance Advanced
    • 1-Identification Profiles.mp4
      22:23
    • 2-Access Policies.mp4
      38:06
    • 3-Decryption Policies.mp4
      24:23
      4-Simple Mail Transfer Protocol
    • 1-The SMTP Protocol.mp4
      20:53
      5-Email Security Appliance Basics
    • 1-Introduction to Cisco Email Security Appliance (ESA).mp4
      10:51
    • 2-ESA Command Line.mp4
      09:21
    • 3-The Listener.mp4
      07:43
    • 4-ESA Operations.mp4
      38:34
      6-Email Security Appliance Advanced
    • 1-ESA Policies Overview.mp4
      10:20
    • 2-Implementing ESA Policies.mp4
      16:30
    4-Advanced Malware Protection
      1-Introduction
    • 1-Course Introduction.mp4
      02:13
      2-AMP Basics
    • 1-Introduction to Advanced Malware Protection.mp4
      14:21
    • 2-AMP Components And Operations.mp4
      24:23
      3-AMP Integration
    • 1-AMP on FTD.mp4
      24:39
    • 2-AMP on WSA.mp4
      19:55
    • 3-AMP on ESA.mp4
      16:47
    5-Cisco Umbrella
      1-Course Introduction
    • 1-Course Introduction.mp4
      01:34
      2-Domain Name System
    • 1-DNS.mp4
      16:33
      3-Umbrella Foundations
    • 1-Introduction to Umbrella.mp4
      14:50
    • 2-Deploying Umbrella.mp4
      28:13
      4-Policies And Features
    • 1-Introduction to Policies.mp4
      21:28
    • 2-Working with Policies.mp4
      21:32
    • 3-Intelligent Proxy.mp4
      16:09
    • 4-Umbrella Investigate.mp4
      10:42
      5-Course Conclusion
    • 1-Course Conclusion.mp4
      00:55
  • Exercise Files.zip
    • 1-Introduction
    • 1-CCIE Security lab Bootcamp.mp4
      22:25
      2-ASA
    • 1-VLANS And IP Addressing.mp4
      13:21
    • 2-Configuring OSPF on ASA.mp4
      16:12
    • 3-Configuring Access-list.mp4
      36:51
    • 4-Configuring Access-list using Objects-Object-Groups.mp4
      25:45
    • 5-Administrative Access.mp4
      17:25
    • 6-ICMP Traffic Protection.mp4
      10:03
    • 7-Manual Dynamic NAT And PAT.mp4
      28:22
    • 8- Dynamic Policy NAT And Policy PAT.mp4
      24:26
    • 9-Auto Dynamic NAT And PAT.mp4
      24:54
    • 10-Static NAT, Static Policy NAT And Static PAT.mp4
      54:18
    • 11-Advanced Routing.mp4
      16:03
    • 12-Twice NAT.mp4
      21:47
    • 13-Transparent Firewall.mp4
      45:01
    • 14- ARP Inspection.mp4
      08:25
    • 15-NTP.mp4
      12:38
    • 16-HTTP Traffic Inspection.mp4
      18:33
    • 17-FTP Traffic Inspection.mp4
      19:46
    • 18-Virtual Firewalls.mp4
      37:53
    • 19-virtual Firewall Routing - Part 1.mp4
      04:13
    • 20-Task 1.19- virtual Firewall Routing - Part 2.mp4
      09:34
    • 21-Task 1.20- Contexts Classification.mp4
      22:05
    • 22-Active Standby Failover.mp4
      21:51
    • 23-Active-Active Failover.mp4
      07:57
    • 24-Clustering in Multi-Context.mp4
      44:33
      3-FTD and NGIPS
    • 1- IP Addressing on FTD in Routed Mode.mp4
      29:37
    • 2-Configuring OSPF on FTD.mp4
      08:14
    • 3-Configuring Access Rules on FTD.mp4
      33:57
    • 4-Configuring NAT on FTD - Part 2.mp4
      19:05
    • 5-Security Intelligence - Part 1.mp4
      13:33
    • 6-Security Intelligence - Part 2.mp4
      44:22
    • 7-Block download of Malware.mp4
      07:59
    • 8-FTD in Transparent Mode.mp4
      20:40
    • 9-NGIPS as Inline.mp4
      20:21
      4-VPN
    • 1-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.mp4
      13:09
    • 2-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.mp4
      28:33
    • 3- Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.mp4
      17:08
    • 4-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.mp4
      14:49
    • 5-Legacy LAN-to-LAN VPN between IOS Routers using IKEv2.mp4
      27:05
    • 6-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv2.mp4
      13:13
    • 7-Legacy LAN-to-LAN VPN with IKEv1 between IOS and IOS using SVTI.mp4
      35:45
    • 8-Legacy LAN-to-LAN VPN with IKEv2 between IOS and IOS using SVTI.mp4
      12:45
    • 9-DMVPN Overview.mp4
      01:06:39
    • 10-DMVPN Phase 1 with IKEv2.mp4
      31:04
    • 11-DMVPN Phase 2 with IKEv2.mp4
      09:43
    • 12-DMVPN Phase 3 with IKEv2.mp4
      08:11
    • 13-Dual Hub Single Cloud DMVPN Phase 3 with IKEv2.mp4
      11:48
    • 14-GET VPN.mp4
      01:11:21
    • 15-FlexVPN.mp4
      31:35
    • 16-FlexVPN Hardware Client.mp4
      21:19
    • 17-Clientless SSL VPN.mp4
      21:36
    • 18-Anyconnect IKEv2.mp4
      12:20
    • 19-Anyconnect IKEv2.mp4
      09:40
    • 20-Configure Site-to-Site Certificate-Based VPN.mp4
      18:12
      5-WSA
    • 1-System Setup.mp4
      15:18
    • 2-WCCP with WSA.mp4
      26:40
    • 3-Global Policy on WSA.mp4
      20:46
    • 4-Custom Blocking on WSA.mp4
      14:58
    • 5-Custom Blocking on WSA.mp4
      16:07
      6-ISE
    • 1- Admin user creation.mp4
      09:13
    • 2-Device login using Radius Protocol.mp4
      51:24
    • 3-Device authorization using Radius Protocol.mp4
      10:10
    • 4-Device login using Tacacs.mp4
      18:18
    • 5-DOT1x for pcA.mp4
      02:57
    • 6-MAB for IP Phone.mp4
      01:00:57
    • 7-Profiling for IP Phone and pcA.mp4
      16:46
    • 8-Wired Central WebAuth, Employee BYOD, Self and Sponsored Guest.mp4
      01:10:16
    • 9- PxGrid with WSA.mp4
      19:49
    • 10- PxGrid with WSA.mp4
      11:51
    • 11- PxGrid with WSA.mp4
      19:13
    • 12-MAB for AP.mp4
      28:56
    • 13-MAB for AP.mp4
      03:19
      7-Troubleshooting
    • 1-Ticket 1.mp4
      18:37
    • 2-Ticket 2.mp4
      36:25
    • 3-Ticket 3.mp4
      14:15
    • 4-Ticket 4.mp4
      11:06
    • 5-Ticket 5.mp4
      16:45
  • CCIE Security Bootcamp v6.pdf
    • 1-Introduction And Overview
    • 1-Course Introduction.mp4
      12:43
      2-Perimeter Security And Intrusion Prevention
        ASA
      • 1-Basic ASA Concepts - Part 1.mp4
        25:18
      • 2-Basic ASA Concepts - Part 2.mp4
        24:56
      • 3-ASA Modes.mp4
        44:34
      3-NAT
    • 1-Policies, Inspections And NAT - Part 1.mp4
      38:34
    • 2-Policies, Inspections And NAT - Part 2.mp4
      17:11
      4-High Availability
    • 1-High Availability.mp4
      23:08
      5-IOS Zone-Based Firewall
    • 1-IOS Zone-Based Firewall.mp4
      40:12
      6-FTD
    • 1-FTD Basics And Modes.mp4
      49:19
    • 2-FTD Policies - Part 1.mp4
      43:46
    • 3-FTD Policies - Part 2.mp4
      42:00
      7-Intrusion Prevention And NGIPS
    • 1-Intrusion Prevention And NGIPS.mp4
      32:08
      8-Secure Connectivity
    • 1-Introduction to VPNs - Part 1.mp4
      32:44
    • 2-Introduction to VPNs - Part 2.mp4
      21:23
    • 3-PKI And FlexVPN - Part 1.mp4
      44:55
    • 4-PKI And FlexVPN - Part 2.mp4
      32:19
    • 5-Remote Access.mp4
      31:13
    • 6-DMVPN - Part 1.mp4
      26:59
    • 7-DMVPN - Part 2.mp4
      25:16
      9-Identity Management And Access Control
        ISE
      • 1-ISE Fundamentals And Policies.mp4
        45:10
      • 2-AAA And Device Administration.mp4
        48:39
        Wireless
      • 1-802.1x for Wired And Wireless Networks - Part 1.mp4
        38:52
      • 2-802.1x for Wired And Wireless Networks - Part 2.mp4
        28:11
      11- Advanced Threat Protection And Content Security
    • 1-Cisco WSA - Part 1.mp4
      35:20
    • 2-Cisco WSA - Part 2.mp4
      33:24
    • 3-Cisco ESA.mp4
      49:32
    • 4-Cisco Umbrella.mp4
      25:00
      12-Infrastructure Security And Automation
    • 1-Securing Management And Control Planes - Part 1.mp4
      28:04
    • 2-ecuring Management And Control Planes - Part 2.mp4
      28:01
      13-Layer 2
    • 1-Securing Layer 2 - Part 1.mp4
      28:03
    • 2-Securing Layer 2 - Part 2.mp4
      23:38
      14-Python And Security
    • 1-Python And Security Automation - Part 1.mp4
      30:12
    • 2-Python And Security Automation - Part 2.mp4
      31:17

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    INE: Expert IT Training for Networking, Cyber Security and Cloud INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
    • language english
    • Training sessions 593
    • duration 196:09:45
    • Release Date 2023/08/24

    Courses related to Cisco CCNA

    Courses related to Cisco

    Courses related to Computer Network

    Courses related to IT Networking Fundamentals

    Courses related to Network Engineering

    Courses related to Cisco CCNP