CCIE Security v6.0
Focused View
196:09:45
137 View
- 1-Introduction
- 1-Course Introduction.mp403:35
- 2-Exam Information
- 1-CCIE Security v6 Exam.mp427:28
- 3-Study And Preparation Resources
- 1-Recommended Study Approach.mp414:17
- 2-Recommended Reading.mp418:16
- 3-Other Resources.mp410:40
- 4-Lab Strategy
- 1-Design.mp415:13
- 2-Deploy, Operate and Optimize.mp427:09
- 5-Course Conclusion
- 1-Course Conclusion.mp401:09
- 1-Layer 2 Technologies for Beginners
- 1-Course Introduction.mp402:04
- 1-Ethernet.mp420:00
- 1-LAN Switching Concepts.mp413:47
- 2-VLANs And Trunking.mp447:19
- 3-VLAN Trunking Protocol (VTP).mp436:36
- 1-Spanning Tree Protocol (STP).mp451:19
- 2-Optional STP Features.mp417:29
- 3-Optional STP Features.mp428:13
- 1-EtherChannel.mp434:10
- 2-Switch Stacking, Chassis Aggregation.mp409:43
- 1-Introdution
- 2-Introduction to Ethernet
- 3-LAN Fundamentals
- 4-Spanning Tree Protocol
- 5-Advanced LAN Concepts
- 2-Routing Technologies for Beginners
- 1-Course Introduction.mp401:50
- 1-IP Routing.mp441:53
- 1-The RIPv2 Protocol.mp434:59
- 2-The EIGRP Protocol.mp401:02:43
- 3-The EIGRPv6 Protocol.mp422:34
- 4-The OSPF Protocol.mp427:08
- 5-The OSPFv3 Protocol.mp423:44
- 6-The BGP Protocol.mp426:16
- 1-Introduction
- 2-Introduction to IP Routing
- 3-Routing Protocols
- 1-IOS Firewall
- 1-Course Introduction.mp408:55
- 2-DoS And DDoS Attacks - Ciscos Guide to DDoS Defense.mp428:45
- 3-DoS And DDoS Attacks - Evolution.mp413:16
- 4-IP Address Spoofing.mp428:49
- 5-Unicast RPF.mp422:02
- 6-Strict uRPF.mp422:47
- 7-Advanced uRPF.mp414:53
- 8-uRPF Troubleshooting.mp412:42
- 9-Remotely Triggered Black Hole Filtering (RTBH).mp428:09
- 10-Source Based RTBH.mp415:33
- 11-ICMP Attacks - Overview.mp421:54
- 12-ICMP Attacks - Mitigation.mp419:10
- 13-UDP Attacks.mp425:54
- 14-TCP Attacks.mp419:11
- 15-TCP Intercept - Overview.mp423:53
- 16-TCP Intercept - Overview.mp427:23
- 17-Fragmentation Attacks - Overview.mp424:05
- 18-Fragmentation Attacks - Overview.mp430:55
- 19-Fragmentation Attack Protection with ACL.mp429:57
- 20-Frangment Filtering via ACL.mp429:21
- 21-Virtual Fragmentation Reassembly (VFR) - Implementation.mp422:40
- 21-Virtual Fragmentation Reassembly (VFR) - Overview.mp414:13
- 1-ZBFW - Overview.mp426:58
- 2-ZBFW Building Blocks - Command Syntax.mp432:26
- 3-ZBFW Building Blocks - Layer 3-4 Policy-Maps.mp435:36
- 4-ZBFW Basic Policy Implementation - Overview.mp427:51
- 5-ZBFW Basic Policy Implementation - Configuration.mp432:41
- 6-ZBFW Traffic Policing.mp413:57
- 7-ZBFW TCP Inspection.mp418:05
- 8-ZBFW TCP OoO Packet.mp418:32
- 9-ZBFW UDP Inspection.mp418:47
- 10-ZBFW ICMP Inspection.mp430:52
- 11-Tuning TCP Connection Settings.mp424:06
- 12-ZBFW TCP Reset Segment Control.mp405:49
- 13-ZBFW TCP Window Scaling.mp409:14
- 14-ZBFW Tuning UDP And ICMP Connection Settings.mp411:52
- 15-ZBFW with ACL.mp417:41
- 1-Course Overview
- 2-Access Lists
- 3-DoS And DDoS Mitigation
- 4-Zone Based Policy Firewall
- 2-ASA Firewall
- 1-Course Introduction.mp403:43
- 1-Configuring IP Addressing on ASA.mp401:30
- 2-Configuring Nameif And Security Levels on ASA.mp401:51
- 1-Configuring Static Routes on ASA.mp402:53
- 2-Configuring EIGRP on ASA.mp404:11
- 3-Control Plane Authentication in EIGRP.mp403:52
- 4-Configuring OSPF on ASA.mp404:21
- 5-Control Plane Authentication in OSPF.mp404:57
- 1-Management Access to ASA.mp403:08
- 1-Configuring Objects, Object-Group And ACL.mp410:26
- 1-Configuring Dynamic NAT.mp412:09
- 2-Configuring Dynamic PAT.mp403:35
- 3-Configuring Static NAT And Static PAT.mp405:21
- 4-Configuring Twice NAT.mp403:46
- 1-BGP Through ASA.mp409:50
- 1-Bridging Vlans using Transparent ASA.mp404:22
- 1-Creating Virtual Firewalls.mp409:56
- 1-Active-Standby And Active-Active.mp408:23
- 1-Clustering.mp420:04
- 1-Overview
- 2-Basic Setup on ASA
- 3-Routing Protocol
- 4-Management Access Setup
- 5-ACL, Objects And Object-Groups
- 6-NAT
- 7-Policy Maps And Class Maps
- 8-Transparent Firewall
- 9-Multi-Context
- 10-Failover
- 11-Clustering
- 3-Perimeter Security
- 1-Instructor Introduction.mp401:20
- 1-Firewall Technologies.mp419:20
- 2-Access Lists.mp433:49
- 3-Zone-Based Firewall (ZFW).mp428:34
- 4-Implementing ZFW.mp420:55
- 5-IOS Network Address Translation (NAT).mp428:39
- 6-NAT for IPv6.mp444:02
- 1-Cisco ASA Firewall Fundamentals.mp415:20
- 2-Redundant Interfaces.mp413:47
- 3-EtherChannels.mp408:25
- 4-ASA Routing Overview.mp417:31
- 5-ASA Routing - EIGRP.mp409:19
- 6-ASA Routing - EIGRP.mp417:13
- 7-ASA Routing - BGP.mp411:17
- 8-ASA Management.mp407:01
- 9-Implementing Management Access.mp406:57
- 10-Traffic Filtering And Control.mp411:10
- 11-Implementing Traffic Filtering.mp414:16
- 12-ASA Network Address Translation (NAT).mp424:49
- 13-ASA Network Address Translation (NAT).mp418:31
- 1-ASA Modes of Operations.mp415:15
- 2-Implementing Transparent ASA.mp417:29
- 3-Implementing Security Contexts.mp419:05
- 4-Modular Policy Framework (MPF) Overview.mp414:05
- 5-Implementing MPF.mp417:38
- 6-ASA High Availability - Failover.mp408:15
- 7-Failover - Active Standby.mp424:01
- 8-Failover - Active Active.mp422:43
- 9-Clustering Overview.mp414:26
- 10-Clustering - Basic Operations.mp419:02
- 11-Clustering - Deployment Modes.mp416:28
- 12-Implementing L3 Clustering.mp427:16
- 13-Implementing L2 Clustering.mp429:52
- 1-Introduction
- 2-IOS Firewall Technologies
- 3-Basic ASA Technologies
- 4-Advanced ASA Technologies
- 4-FTD Next Generation Firewall
- Exercise Files.zip
- 1-Introduction to Firepower Systems.mp417:54
- 2- Managing FTD.mp421:03
- 3-The Registration.mp414:18
- 4-Troubleshooting FTD.mp411:18
- 5-FTD Objects.mp408:49
- 6-Deployment Modes.mp424:01
- 7-FTD Initialization Routing.mp417:15
- 8-FTD Policies Overview.mp418:40
- 1-Access Control Policy (ACP).mp432:28
- 2-Special Policies.mp436:28
- 3-Security Intelligence (SI).mp427:00
- 4- URL Filtering.mp425:51
- 5-Network Discovery.mp418:26
- 6-File Policy.mp425:52
- 7- SSL Policy.mp427:26
- 1-Introduction to Next Generation IPS (NGIPS).mp412:08
- 2-Snort Variables Rules.mp423:08
- 3-Implementing NGIPS.mp428:22
- 1-Firepower Threat Defense Basics
- 2-Policies Features
- 3-Threat Prevention
- 5-Firepower Threat Defense (FTD) - Part I
- firepower.pdf
- 1-Course Introduction.mp421:41
- 2-Packet Flow - Overview.mp414:44
- 1-Installing a Cisco Firepower Managent Center (FMC) - Part 1.mp405:40
- 2-Installing a Cisco Firepower Managent Center (FMC) - Part 2.mp407:51
- 1-System Configuration.mp416:13
- 2-Health Policies And Health Alerts.mp408:47
- 1-Installing FTD on a Cisco 5500-x - Part 1.mp412:33
- 2-Installing FTD on a Cisco 5500-x - Part 2.mp416:38
- 1-FXOS And Chassis Manager.mp413:49
- 1-Firepower-FTD Objects - Part 1.mp419:31
- 2-Firepower-FTD Objects - Part 2.mp423:33
- 1-FTD Interface Configuration - Part 1.mp413:23
- 2-FTD Interface Configuration - Part 2.mp404:00
- 3-FTD Routing Configuration.mp411:22
- 4-FTD Platform Settings.mp427:52
- 1-Access Control Policy - Part 1.mp417:58
- 2-Access Control Policy - Part 2.mp420:59
- 3-Access Control Policy - Part 3.mp432:53
- 4-FTD PreFilter.mp412:58
- 5-Network Address Translation (NAT).mp420:48
- 6-Malware And File Policy.mp421:34
- 7-IPS Policy - Part 1.mp414:31
- 8-IPS Policy - Part 2.mp428:11
- 1-Firepower Network Discovery.mp418:42
- 2-Reporting And Task Management.mp421:10
- 1-Network Analysis - Part 1.mp417:07
- 2-Network Analysis - Part 2.mp419:27
- 3-Network Analysis - Part 3.mp423:50
- 1-User Account Managment.mp416:49
- 1-Identity Policy.mp414:49
- 1-Firepower Threat Defense
- 2-Firepower Managent Center (FMC)
- 3-Configuring the FMC
- 4-Installing FTD
- 5-Cisco FTD 41009300
- 6-Firepower Logical Objects
- 7-Configuring FTD
- 8-Configuring Policies
- 9-Discovering Users, Hosts And Aplications
- 10-Turning Your System
- 11-Managing Administrators
- 12-Connecting the FMC to Your AD
- 6-Firepower Threat Defense (FTD) - Part II
- 1-Course Introduction.mp403:20
- 1-External Authentication with RADIUS - Overview.mp405:11
- 2-External Authentication with RADIUS - Configuration.mp430:13
- 3-FlexConfig - Overview.mp411:51
- 4-FlexConfig - Configuration.mp428:49
- 5-High Availability.mp417:41
- 1-SSL Policy - Overview.mp419:30
- 2-SSL Policy - Configuration.mp418:04
- 3-Quality of Service (QoS).mp407:35
- 4-Correlation Policy.mp426:40
- 1-FTD VPN.mp407:03
- 2-Site-to-Site IPsec IKEv1.mp417:36
- 3-Remote Access SSL-TLS.mp426:16
- 1-Introduction
- 2-Advanced Management And HA
- 3-Advanced Policies
- 4-Virtual Private Networks
- 1-CryptographyAndPKI
- Course Introduction.pdf
- Cryptography and PKI.pdf
- 1-Course Introduction.mp409:18
- 1-Introduction to Cryptography.mp413:19
- 2-Hashing.mp420:44
- 3-Symmetric Encryption.mp422:56
- 4- Asymmetric Encryption.mp412:46
- 5-Digital Signatures.mp411:11
- 6-Next Generation Encryption.mp418:01
- 1- Public Key Infrastructure.mp421:49
- 2- Enrollment Revocation.mp414:17
- 3-PKI Architectures.mp413:54
- 4-Implementing PKI.mp429:32
- 5-ASA PKI.mp411:38
- 1-Introduction
- 2-Cryptography
- 3-Public Key Infrastructure (PKI)
- 2-IKEv1 IPsec VPN
- Course Introduction - IKEv1 IPsec VPN.output.pdf
- IKEv1 IPsec VPN.output.pdf
- 1-Course Introduction.mp403:26
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- ASA1.txt
- R1.txt
- R2.txt
- SW1.txt
- 1-VPNs, Tunneling GRE.mp424:08
- 1-IPsec Overview.mp431:43
- 2- IPsec Tunneling.mp412:29
- 3-IPsec on the ASA.mp415:04
- 4-Implementing L2L IPsec VPN - IOS-ASA.mp422:22
- 1- IOS Advanced IPsec Solutions.mp430:21
- 2-IPsec IPv6.mp407:49
- ikev1 ipsec topo ipv4.zip
- 1-Overview
- 1. Instructor Demo Configs
- MODULE 1
- FINAL
- INITIAL
- MODULE 5
- FINAL
- INITIAL
- MODULE 6
- FINAL
- INITIAL
- 2-Virtual Private Networks
- 3-IKEv1 IPsec Fundamentals
- 4-IPsec Advanced
- Topology
- 3-Dynamic Multipoint VPN (DMVPN)
- 1-Course Introduction.mp404:11
- 1-DMVPN - Overview.mp417:42
- 2-DMVPN - Routing.mp424:55
- 3-DMVPN - Phase I.mp416:48
- 4-Implementing DMVPN - Phase I.mp441:45
- 5-DMVPN - Phase II.mp412:18
- 6-Implementing DMVPN - Phase II.mp425:17
- 7-DMVPN - Phase III.mp417:02
- 8-Implementing DMVPN - Phase III.mp413:40
- 9-DMVPN And IPv6.mp408:50
- 10-Implementing IPv6 DMVPN.mp419:03
- 11-DMVPN Dual Hub.mp415:28
- 12-Implementing DMVPN Dual Hub.mp419:30
- 1-Course Overview
- 2-Dynamic Multipoint VPN (DMVPN)
- 4-Group Encrypted Transport VPN (GETVPN)
- 1-Course Introduction.mp404:50
- 1-GETVPN Overview.mp422:54
- 2-Implementing GETVPN.mp439:35
- 3-GETVPN for IPv6.mp423:14
- 1-COOP KS.mp437:48
- 2-G-IKEv2.mp430:21
- 1-Overview
- 2-GETVPN Basics
- 3-GETVPN Advanced
- 5-Secure Connectivity
- 1-Cryptography Basics.mp431:18
- 2-Public Key Infrastructure (PKI).mp440:44
- 3-PKI Configuration.mp427:28
- 1-Virtual Private Network (VPN) And IPsec.mp448:55
- 2-IPsec on the ASA.mp413:55
- 3-IPsec VPN - L2L IOS-ASA.mp439:24
- 4-IPsec VPN - L2L Digital Certificates.mp425:02
- 5-ASA Certificate Maps.mp412:39
- 6-IOS Advanced IPsec Solutions.mp452:44
- 7-IPsec for IPv6.mp439:04
- 8-VRF-Aware IPsec.mp431:19
- 1-IKE Version 2 Overview.mp415:11
- 2-Cisco FlexVPN.mp442:10
- 4-Cisco FlexVPN - Client-Server.mp438:20
- 1-The SSL And TLS Protocols.mp419:34
- 2-Remote Access VPN - SSL-TLS.mp414:40
- 3-Cisco AnyConnect.mp403:37
- 4-ASA Clientless SSL VPN.mp415:48
- 5-ASA AnyConnect SSL VPN.mp414:36
- 6-IOS SSL VPN.mp413:41
- 1-Introduction to DMVPN.mp441:49
- 2-Implementing DMVPN.mp449:36
- 3-DMVPN for IPv6.mp442:12
- 4-DMVPN - Dual Hub.mp410:48
- 1-Introduction to GETVPN.mp430:42
- 2-Implementing GETVPN.mp437:23
- 3-GETVPN for IPv6.mp415:15
- 4-GETVPN - G-IKEv2.mp419:59
- 1-Cryptography Public Key Infrastructure
- 2-Virtual Private Networks IP Security
- 3-IKE version 2
- 4-SSLTLS VPNs
- 5-Dynamic Multipoint VPN
- 6-Group Encrypted Transport VPN
- 1-Network Management Security
- 1-Course Introduction.mp401:58
- 1-Securing Administrative Access - Part 1.mp425:13
- 2-Securing Administrative Access - Part 2.mp415:36
- 3-Role-Based CLI Access.mp420:02
- 4-Logging.mp413:43
- 1-Securing SNMP.mp421:45
- 2-Securing NTP.mp424:20
- 1-Overview
- 2-Secure Network Management
- 3-Hardening Management Protocols
- 2-Routing Protocol Security
- Exercise Files.zip
- 1- Course Introduction.mp401:57
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- CSR1.txt
- CSR2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- 1- Routing Protocol Authentication.mp419:35
- 1-Securing EIGRP.mp427:40
- 2-Securing OSPF.mp430:39
- 3-Securing BGP.mp425:17
- 1-Overview
- 1. Instructor Demo Configs
- M1 NOT NEEDED
- FINAL
- INITIAL
- MODULE 2
- FINAL
- INITIAL
- MODULE 3
- FINAL
- INITIAL
- MODULE 4
- FINAL
- INITIAL
- 2-Routing Protocol Security Basics
- 3-Routing Protocol Hardening
- 3-Layer 2 Security
- L2 Security.pdf
- l2 security topo.zip
- 1-Course Introduction.mp402:22
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- 1-Securing Switching.mp431:40
- 2-Protecting STP.mp417:32
- 3-Securing DHCP.mp427:44
- 4-Preventing Spoofing.mp427:23
- 1-Private VLANs.mp428:38
- 2-Port-based Traffic Control.mp416:44
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- ASA1.txt
- ASA2.txt
- R1.txt
- R2.txt
- SW1.txt
- SW2.txt
- 1-Introduction
- 1. Instructor Demo Configs
- MODULE 1
- FINAL
- INITIAL
- MODULE 2
- FINAL
- INITIAL
- MODULE 3
- FINAL
- INITIAL
- MODULE 4
- FINAL
- INITIAL
- MODULE 5
- FINAL
- INITIAL
- MODULE 6
- FINAL
- INITIAL
- 2-L2 Attacks Mitigation
- 3-L2 Security Features
- Task And Solution Configs
- TASK 1
- FINAL
- INITIAL
- TASK 2
- FINAL
- INITIAL
- TASK 3
- FINAL
- INITIAL
- TASK 4
- FINAL
- INITIAL
- TASK 5
- FINAL
- INITIAL
- TASK 6
- FINAL
- INITIAL
- 4-Infrastructure Security
- 1-Instructor Introduction.mp401:19
- 1-Network Device Architecture.mp406:25
- 2-Routing Protocol Authentication.mp412:11
- 3-Implementing Routing Protocol Authentication.mp410:11
- 4-Route Filtering.mp408:58
- 5-Control Plane Policing.mp414:47
- 6-Control Plane Protection.mp415:06
- 7-Implementing Control Plane Protection.mp414:37
- 8-Basic CPU Protection Mechanisms.mp409:54
- 9-Basic Memory Protection Mechanisms 2017.mp407:40
- 1-Secure Network Management.mp438:28
- 2-Management Plane Protection.mp404:44
- 3-SNMP, NTP And Logging.mp449:55
- 4-The DHCP Protocol.mp417:05
- 5-DHCPv6.mp411:42
- 6-The DNS Protocol.mp420:43
- 1-IP Spoofing Attacks.mp410:57
- 2-Mitigation Tools ACLs.mp433:49
- 3-Mitigation Tools URPF.mp429:17
- 4-DoS Attacks.mp410:49
- 5-Mitigation Tools - TCP Intercept.mp419:23
- 6-Mitigation Tools - Policing.mp407:48
- 7-Mitigation Tools - RTBH.mp426:39
- 8-IP Options And Security.mp410:22
- 9-IP Options - Attack Mitigation.mp409:47
- 10-IP Fragmentation.mp412:13
- 11-IP Fragmentation - Attack Mitigation.mp412:11
- 12-NBAR And NBAR2.mp421:47
- 1-IPv6 Extension Headers.mp408:54
- 2-Extension Headers Processing And Security.mp411:28
- 3-Extension Headers - Attacks Mitigation.mp426:22
- 4-IPv6 Fragmentation.mp417:56
- 5-IPv6 Fragmentation Attacks Mitigation.mp418:20
- 6-Neighbor Discovery.mp411:56
- 7-Neighbor Discovery Messages.mp417:10
- 8-Secure Neighbor Discovery (SEND) Introduction.mp413:46
- 9-SEND Operations.mp420:46
- 10-SEND Configuration.mp432:04
- 1-Discovery Protocols.mp425:07
- 2-VLANs And Trunking.mp420:14
- 3-Spanning Tree Protocol (STP).mp429:22
- 4-STP Security Features - Part I.mp417:30
- 5-STP Security Features - Part II.mp420:43
- 6-Layer 2 Security - Part I.mp445:22
- 7-Layer 2 Security - Part II.mp445:01
- 8-Private VLANs And Protected Ports.mp419:03
- 9-Storm Control.mp404:49
- 1-Wireless Basics.mp419:59
- 2-Wireless Security.mp415:32
- 1-Device Hardening - ASA.mp411:42
- 2-Device Hardening - IOS.mp411:27
- 3-Cisco SAFE.mp407:38
- 1-Introduction
- 2-Securing the Control Plane
- 3-Securing the Management Plane
- 4-Network Attacks Mitigation
- 5-Securing IPv6
- 6-Securing Layer 2
- 7-Securing Wireless Networks
- 8-Security Best Practices
- 5-IPv6 First Hop Security vSeminar
- 1-IPv6 First Hop Security - Part 1.mp439:25
- 2-IPv6 First Hop Security - Part 2.mp438:47
- 3-IPv6 First Hop Security - Part 3.mp413:51
- 6-Security with StealthWatch using NetFlow
- 1-Introduction to Stealthwatch.mp427:34
- 2-Basic Stealthwatch System Installation - Part 1.mp429:08
- 3-Basic Stealthwatch System Installation - Part 2.mp415:39
- 1-SMC Configuration.mp424:18
- 1-Host Groups and User Management.mp430:17
- 2-Classification of Customer Environment.mp422:05
- 1-Detecting Indicators of Compromise (IoC) - Part 1.mp422:06
- 2-Detecting Indicators of Compromise (IoC) - Part 2.mp423:12
- 3-SNMP, Storage, Backup And Upgrade.mp425:13
- 1-Stealthwatch Introduction
- 2-Understanding SMC
- 3-Classifying Known and Unknown Network Entities
- 4-Security and System Maintenance
- 1-Identity Services Engine (ISE)
- 1-Course Introduction.mp403:08
- 1-Introduction to Cisco ISE.mp419:44
- 2-The Policies.mp447:31
- 3-Integrating with Active Directory.mp403:41
- 1-Authentication, Authorization Accounting (AAA) Overview.mp421:47
- 2-AAA Components Configuration.mp432:57
- 3-Introduction to Cisco Access Control Server (ACS).mp423:14
- 4-Introduction to Cisco Identity Services Engine (ISE).mp411:51
- 5- AD Integration.mp405:18
- 6-ISE Policies.mp432:43
- 7-Administrative Access - ISE.mp441:12
- 8-Administrative Access - ACS.mp418:57
- 1-AAA Overview.mp416:47
- 2-AAA Components And Configuration.mp432:30
- 3-Controlling Administrative Access.mp437:36
- 1-Introduction to Profiling.mp437:08
- 2-Change of Authorization (CoA).mp411:20
- 3-Profiling Probes.mp419:10
- 4-Enabling Profiling.mp415:55
- 5-802.mp425:02
- 6-802.1x Deployment Modes.mp417:32
- 7-Implementing Wired 802.mp446:29
- 8-Implementing Wireless 802.mp417:30
- 9-Guest Services.mp414:40
- 1-Distributed ISE.mp423:20
- 2-Deploying ISE Multinode.mp419:44
- 1-Course Conclusion.mp401:05
- 1-Introduction
- 2-ISE Basics
- 3-Access Control - Administration
- main
- 4-Access Control Network
- 5-Scaling ISE Deployments
- 6-conclusion
- 2-Advanced Identity Services Engine (ISE)
- 1-Course Introduction.mp402:38
- 1-AD Integration.mp422:29
- 2-EAP Chaining.mp441:04
- 3-Advanced Profiling.mp441:38
- 4-Certificate Services.mp420:01
- 1-ISE And WSA - pxGrid.mp450:24
- 2-ISE And FTD - pxGrid.mp451:01
- 1-course intro
- 2-common confguration
- 3-context sharing
- 3-TrustSec
- 1-Course Introduction.mp402:32
- 1-Introduction to TrustSec.mp424:54
- 2-Classification And SGT.mp415:37
- 3-Propagation And SXP.mp445:56
- 4-Enforcement And SGACL.mp416:28
- 1-TrustSec on IOS.mp451:53
- 2-TrustSec on ASA.mp423:08
- 3-TrustSec for Wireless Networks.mp414:17
- 1-Introduction
- 2-TrustSec Overview And Operations
- 3-Implementing TrustSec
- 1-Network Programmability Foundation
- Network Programmability Foundation.pdf
- 1-Course Introduction.mp402:42
- 1-Introduction to Network Programmability Foundation.mp426:33
- 2-Automation Tools.mp419:37
- 3-Version Control with Git.mp433:40
- 4-Distributed Git and GitHub.mp412:39
- 1-introduction to Python.mp432:38
- 2-Basic Python Constructs.mp438:53
- 3-Data Types - Numbers.mp409:01
- 4-Data Types - Boolean.mp407:23
- 5-Data Types - String.mp438:29
- 6-Data Types - Dictionary.mp415:52
- 7-Conditionals.mp425:31
- 8-Loops.mp421:14
- 9-Functions.mp420:34
- 10-File Access.mp421:03
- 11-Classes.mp419:57
- 12-Modules and Packages.mp416:44
- 1-Data Formats - JSON.mp410:15
- 2-Data Formats - XML.mp424:07
- 3-Data Formats - YAML.mp411:48
- 1-Introduction to APIs.mp414:33
- 2-API Toolset.mp422:20
- 3-Python Automation with REST API.mp423:28
- 1-Course Conclusion.mp401:00
- 1-Course Introduction
- 2-Programmability Overview
- 3-Python Programming Basics
- 4-Data Formats
- 5-APIs
- 6-Course Conclusion
- 2-cisco DNA
- 1-The Cisco DNA Architecture.mp407:48
- 2-The Management Layer.mp404:58
- 3-Fabric Underlay Design Architecture Guidelines.mp409:27
- 4-Network Underlay Best Practices.mp408:31
- 5-Design Considerations for SD-Access Fabric Architecture.mp406:06
- 6-SD-Access Node Types.mp407:39
- 7-Campus Fabric Components.mp405:05
- 8-SD-Access Deployment Considerations.mp408:44
- 9-Fabric Deployment Models.mp402:51
- 10-DNAC Workflows, Device Discovery And LAN Automation.mp412:50
- 11-ISE Roles And DNAC Communication.mp405:07
- 12-ISE Standalone And Distributed Deployment.mp403:16
- 13-DNAC And ISE Integration.mp405:08
- 3-Intent-Based Networking
- VOD-3568 SD-Access Software Defined Fundamentals.pdf
- 1-Course Introduction.mp402:03
- 1-Why Study SD-Access.mp405:11
- 2-The 2020 Global Networking Trends Report.mp403:59
- 3-The Future of Networking.mp406:49
- 1-Introduction to Intent-Based Networking (IBN).mp406:31
- 2-IBN in a Nutshell.mp406:40
- 3-Demystifying Software Defined-Access.mp405:26
- 4-Defining SD-Access.mp406:47
- 1-SD-Access And IBN.mp403:59
- 2-The What, How, and Why of SD-Access.mp411:45
- 3-Why Move to SD-Access.mp408:58
- 1-Overview of SD-Access Main Components.mp404:40
- 2-Cisco ISE.mp404:26
- 3-The Overlay Fabric.mp403:22
- 1-Document Repository for SD-Access.mp408:41
- 2-Hardware, Software, Licensing And Release Documentation.mp402:10
- 3-Exam-Related Documentation.mp402:04
- 4-How to Study for the CCIE.mp403:23
- 1-Introduction to the ISE Role in the SD-Access Architectur.mp406:45
- 2-ISE Deployment Models.mp405:50
- 3-ISE Integration with SD-Access.mp406:18
- 1-Course Conclusion.mp405:11
- 1-Introduction
- 2-Why Study SD-Access
- 3-Intent-Based Networking
- 4-The What, How and Why of SD-Access
- 5-Overview of SD-Access Main Components
- 6-Document Repository for SD-Access
- 7-Introduction to the ISE Role
- 8-Conclusion
- 1-Email Security Appliance
- 1-Course Introduction.mp402:42
- 1-SMTP.mp421:15
- 2-ESA Overview.mp411:24
- 3-ESA Initialization - Part 1.mp417:41
- 4-ESA Initialization - Part 2.mp418:33
- 5-Email Pipeline.mp410:25
- 6-Access Tables - Part 1.mp419:03
- 7-Access Tables - Part 2.mp419:36
- 1-Introduction to Policies.mp422:39
- 2-ESA Policies - Part 1.mp428:11
- 3-ESA Policies - Part 2.mp428:24
- 1-Message Filters.mp415:59
- 1-Overview
- 2-Introduction to Cisco ESA
- 3-The Policies
- 4-Advanced ESA Features
- 2-Web Security Appliance
- 1-Course Introduction.mp403:49
- 2-Introduction to the Web Security Appliance.mp410:43
- 1-System Setup Wizard.mp401:54
- 2-Web Cache Communication Protocol (WCCP).mp403:25
- 1-Blocking Global URL Categories.mp404:50
- 2-Blocking Custom URLs.mp406:01
- 1-Blocking Custom Browsers.mp406:10
- 1-Blocking Applications.mp403:09
- 1-Blocking Custom Objects.mp402:52
- 1-WSA CLI.mp401:56
- 1-Failover.mp408:16
- 1-Web Reputation.mp407:12
- 1-Advanced Web Security.mp406:29
- 1-PxGrid.mp403:10
- 1-Course Conclusion.mp401:24
- 1-Overview
- 2-Connect, Install, And Configure
- 3-URL Filtering
- 4-Protocols And User Agents
- 5-Applications
- 6-Objects
- 7-Command Line Interface
- 8-High Availability
- 9-Anti-Malware And Reputation
- 10-Time Restrictions And Quotas
- 11-Integration with ISE
- 12-Final Words from the Instructor
- 3-Content Security
- 1-The HTTP Protocol.mp416:27
- 1-Introduction to Cisco Web Security Appliance (WSA).mp412:49
- 2-Initializing WSA.mp428:23
- 3-WSA Modes.mp440:38
- 1-Identification Profiles.mp422:23
- 2-Access Policies.mp438:06
- 3-Decryption Policies.mp424:23
- 1-The SMTP Protocol.mp420:53
- 1-Introduction to Cisco Email Security Appliance (ESA).mp410:51
- 2-ESA Command Line.mp409:21
- 3-The Listener.mp407:43
- 4-ESA Operations.mp438:34
- 1-ESA Policies Overview.mp410:20
- 2-Implementing ESA Policies.mp416:30
- 1-Hypertext Transfer Protocol
- 2-Web Security Appliance Basics
- 3-Web Security Appliance Advanced
- 4-Simple Mail Transfer Protocol
- 5-Email Security Appliance Basics
- 6-Email Security Appliance Advanced
- 4-Advanced Malware Protection
- 1-Course Introduction.mp402:13
- 1-Introduction to Advanced Malware Protection.mp414:21
- 2-AMP Components And Operations.mp424:23
- 1-AMP on FTD.mp424:39
- 2-AMP on WSA.mp419:55
- 3-AMP on ESA.mp416:47
- 1-Introduction
- 2-AMP Basics
- 3-AMP Integration
- 5-Cisco Umbrella
- 1-Course Introduction.mp401:34
- 1-DNS.mp416:33
- 1-Introduction to Umbrella.mp414:50
- 2-Deploying Umbrella.mp428:13
- 1-Introduction to Policies.mp421:28
- 2-Working with Policies.mp421:32
- 3-Intelligent Proxy.mp416:09
- 4-Umbrella Investigate.mp410:42
- 1-Course Conclusion.mp400:55
- 1-Course Introduction
- 2-Domain Name System
- 3-Umbrella Foundations
- 4-Policies And Features
- 5-Course Conclusion
Exercise Files.zip
- 1-Introduction
- 1-CCIE Security lab Bootcamp.mp422:25
- 2-ASA
- 1-VLANS And IP Addressing.mp413:21
- 2-Configuring OSPF on ASA.mp416:12
- 3-Configuring Access-list.mp436:51
- 4-Configuring Access-list using Objects-Object-Groups.mp425:45
- 5-Administrative Access.mp417:25
- 6-ICMP Traffic Protection.mp410:03
- 7-Manual Dynamic NAT And PAT.mp428:22
- 8- Dynamic Policy NAT And Policy PAT.mp424:26
- 9-Auto Dynamic NAT And PAT.mp424:54
- 10-Static NAT, Static Policy NAT And Static PAT.mp454:18
- 11-Advanced Routing.mp416:03
- 12-Twice NAT.mp421:47
- 13-Transparent Firewall.mp445:01
- 14- ARP Inspection.mp408:25
- 15-NTP.mp412:38
- 16-HTTP Traffic Inspection.mp418:33
- 17-FTP Traffic Inspection.mp419:46
- 18-Virtual Firewalls.mp437:53
- 19-virtual Firewall Routing - Part 1.mp404:13
- 20-Task 1.19- virtual Firewall Routing - Part 2.mp409:34
- 21-Task 1.20- Contexts Classification.mp422:05
- 22-Active Standby Failover.mp421:51
- 23-Active-Active Failover.mp407:57
- 24-Clustering in Multi-Context.mp444:33
- 3-FTD and NGIPS
- 1- IP Addressing on FTD in Routed Mode.mp429:37
- 2-Configuring OSPF on FTD.mp408:14
- 3-Configuring Access Rules on FTD.mp433:57
- 4-Configuring NAT on FTD - Part 2.mp419:05
- 5-Security Intelligence - Part 1.mp413:33
- 6-Security Intelligence - Part 2.mp444:22
- 7-Block download of Malware.mp407:59
- 8-FTD in Transparent Mode.mp420:40
- 9-NGIPS as Inline.mp420:21
- 4-VPN
- 1-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.mp413:09
- 2-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.mp428:33
- 3- Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.mp417:08
- 4-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.mp414:49
- 5-Legacy LAN-to-LAN VPN between IOS Routers using IKEv2.mp427:05
- 6-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv2.mp413:13
- 7-Legacy LAN-to-LAN VPN with IKEv1 between IOS and IOS using SVTI.mp435:45
- 8-Legacy LAN-to-LAN VPN with IKEv2 between IOS and IOS using SVTI.mp412:45
- 9-DMVPN Overview.mp401:06:39
- 10-DMVPN Phase 1 with IKEv2.mp431:04
- 11-DMVPN Phase 2 with IKEv2.mp409:43
- 12-DMVPN Phase 3 with IKEv2.mp408:11
- 13-Dual Hub Single Cloud DMVPN Phase 3 with IKEv2.mp411:48
- 14-GET VPN.mp401:11:21
- 15-FlexVPN.mp431:35
- 16-FlexVPN Hardware Client.mp421:19
- 17-Clientless SSL VPN.mp421:36
- 18-Anyconnect IKEv2.mp412:20
- 19-Anyconnect IKEv2.mp409:40
- 20-Configure Site-to-Site Certificate-Based VPN.mp418:12
- 5-WSA
- 1-System Setup.mp415:18
- 2-WCCP with WSA.mp426:40
- 3-Global Policy on WSA.mp420:46
- 4-Custom Blocking on WSA.mp414:58
- 5-Custom Blocking on WSA.mp416:07
- 6-ISE
- 1- Admin user creation.mp409:13
- 2-Device login using Radius Protocol.mp451:24
- 3-Device authorization using Radius Protocol.mp410:10
- 4-Device login using Tacacs.mp418:18
- 5-DOT1x for pcA.mp402:57
- 6-MAB for IP Phone.mp401:00:57
- 7-Profiling for IP Phone and pcA.mp416:46
- 8-Wired Central WebAuth, Employee BYOD, Self and Sponsored Guest.mp401:10:16
- 9- PxGrid with WSA.mp419:49
- 10- PxGrid with WSA.mp411:51
- 11- PxGrid with WSA.mp419:13
- 12-MAB for AP.mp428:56
- 13-MAB for AP.mp403:19
- 7-Troubleshooting
- 1-Ticket 1.mp418:37
- 2-Ticket 2.mp436:25
- 3-Ticket 3.mp414:15
- 4-Ticket 4.mp411:06
- 5-Ticket 5.mp416:45
CCIE Security Bootcamp v6.pdf
- 1-Introduction And Overview
- 1-Course Introduction.mp412:43
- 2-Perimeter Security And Intrusion Prevention
- 1-Basic ASA Concepts - Part 1.mp425:18
- 2-Basic ASA Concepts - Part 2.mp424:56
- 3-ASA Modes.mp444:34
- ASA
- 3-NAT
- 1-Policies, Inspections And NAT - Part 1.mp438:34
- 2-Policies, Inspections And NAT - Part 2.mp417:11
- 4-High Availability
- 1-High Availability.mp423:08
- 5-IOS Zone-Based Firewall
- 1-IOS Zone-Based Firewall.mp440:12
- 6-FTD
- 1-FTD Basics And Modes.mp449:19
- 2-FTD Policies - Part 1.mp443:46
- 3-FTD Policies - Part 2.mp442:00
- 7-Intrusion Prevention And NGIPS
- 1-Intrusion Prevention And NGIPS.mp432:08
- 8-Secure Connectivity
- 1-Introduction to VPNs - Part 1.mp432:44
- 2-Introduction to VPNs - Part 2.mp421:23
- 3-PKI And FlexVPN - Part 1.mp444:55
- 4-PKI And FlexVPN - Part 2.mp432:19
- 5-Remote Access.mp431:13
- 6-DMVPN - Part 1.mp426:59
- 7-DMVPN - Part 2.mp425:16
- 9-Identity Management And Access Control
- 1-ISE Fundamentals And Policies.mp445:10
- 2-AAA And Device Administration.mp448:39
- 1-802.1x for Wired And Wireless Networks - Part 1.mp438:52
- 2-802.1x for Wired And Wireless Networks - Part 2.mp428:11
- ISE
- Wireless
- 11- Advanced Threat Protection And Content Security
- 1-Cisco WSA - Part 1.mp435:20
- 2-Cisco WSA - Part 2.mp433:24
- 3-Cisco ESA.mp449:32
- 4-Cisco Umbrella.mp425:00
- 12-Infrastructure Security And Automation
- 1-Securing Management And Control Planes - Part 1.mp428:04
- 2-ecuring Management And Control Planes - Part 2.mp428:01
- 13-Layer 2
- 1-Securing Layer 2 - Part 1.mp428:03
- 2-Securing Layer 2 - Part 2.mp423:38
- 14-Python And Security
- 1-Python And Security Automation - Part 1.mp430:12
- 2-Python And Security Automation - Part 2.mp431:17
More details
User Reviews
Rating
average 0
Focused display

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 593
- duration 196:09:45
- Release Date 2023/08/24