Companies Home Search Profile

CCNP and CCIE Security Core SCOR 350-701

Focused View

9:40:31

77 View
  • 001 - Introduction.mp4
    02:59
  • 002 - Module introduction.mp4
    00:23
  • 003 - Learning objectives.mp4
    01:27
  • 004 - 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4
    13:33
  • 005 - 1.2 Keyloggers and Spyware.mp4
    02:54
  • 006 - 1.3 Malware Analysis Techniques.mp4
    03:34
  • 007 - 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks.mp4
    03:11
  • 008 - 1.5 Surveying Common Application-based Vulnerabilities.mp4
    05:27
  • 009 - 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities.mp4
    07:47
  • 010 - 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4
    18:57
  • 011 - 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4
    20:30
  • 012 - 1.9 Understanding Buffer Overflows.mp4
    05:33
  • 013 - 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4
    03:57
  • 014 - 1.11 Understanding Security Threats in Cloud Environments.mp4
    08:17
  • 015 - 1.12 Understanding IoT Security Threats.mp4
    09:32
  • 016 - Learning objectives.mp4
    00:39
  • 017 - 2.1 Introducing Cryptography and Cryptanalysis.mp4
    01:46
  • 018 - 2.2 Understanding Encryption Protocols.mp4
    05:02
  • 019 - 2.3 Describing Hashing Algorithms.mp4
    03:54
  • 020 - 2.4 Introducing Public Key Infrastructure (PKI).mp4
    05:15
  • 021 - 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4
    05:02
  • 022 - 2.6 Surveying SSL and TLS Implementations.mp4
    04:21
  • 023 - 2.7 Surveying IPsec Implementations.mp4
    14:35
  • 024 - Module introduction.mp4
    00:25
  • 025 - Learning objectives.mp4
    00:50
  • 026 - 3.1 Introducing SDN.mp4
    04:28
  • 027 - 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4
    02:48
  • 028 - 3.3 Introducing Cisco ACI.mp4
    06:12
  • 029 - 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4
    07:06
  • 030 - 3.5 Understanding VXLAN and Network Overlays.mp4
    03:14
  • 031 - 3.6 Understanding Microsegmentation.mp4
    04:03
  • 032 - 3.7 Surveying Open Source SDN Solutions.mp4
    03:26
  • 033 - 3.8 Understanding the Threats Against SDN Solutions.mp4
    02:25
  • 034 - 3.9 Understanding the Security Benefits in SDN Solutions.mp4
    01:58
  • 035 - Learning objectives.mp4
    01:01
  • 036 - 4.1 Introducing Network Programmability.mp4
    08:44
  • 037 - 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4
    01:12
  • 038 - 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4
    11:29
  • 039 - 4.4 A Brief Introduction to Git.mp4
    06:10
  • 040 - 4.5 Exploring pxGrid.mp4
    05:07
  • 041 - 4.6 Integrating and Automating Security Operations with Cisco Products.mp4
    03:27
  • 042 - Module introduction.mp4
    00:28
  • 043 - Learning objectives.mp4
    00:58
  • 044 - 5.1 Understanding Authentication.mp4
    12:28
  • 045 - 5.2 Exploring the RADIUS Protocol.mp4
    03:48
  • 046 - 5.3 Surveying the TACACS+ Protocol.mp4
    02:35
  • 047 - 5.4 Understanding Authorization.mp4
    02:33
  • 048 - 5.5 Surveying Authorization Models.mp4
    04:37
  • 049 - 5.6 Defining Accounting.mp4
    01:56
  • 050 - 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4
    06:26
  • 051 - 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4
    01:46
  • 052 - 5.9 Understanding Cisco DUO.mp4
    04:39
  • 053 - 5.10 Introducing Cisco ISE.mp4
    03:35
  • 054 - 5.11 Understanding Cisco ISE Profiling Services.mp4
    03:20
  • 055 - 5.12 Understanding ISE Identity Services.mp4
    04:29
  • 056 - 5.13 Describing ISE Authorization Rules.mp4
    02:47
  • 057 - Learning objectives.mp4
    01:33
  • 058 - 6.1 Defining Network Visibility and Segmentation.mp4
    02:20
  • 059 - 6.2 Introducing NetFlow and IPFIX.mp4
    02:21
  • 060 - 6.3 Describing Flexible NetFlow Records.mp4
    04:19
  • 061 - 6.4 Understanding NetFlow Deployment.mp4
    03:10
  • 062 - 6.5 Exploring Cisco Stealthwatch.mp4
    01:57
  • 063 - 6.6 Deploying Cisco Stealthwatch Cloud.mp4
    03:31
  • 064 - 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4
    00:57
  • 065 - 6.8 Exploring the Cisco TrustSec Solution.mp4
    03:34
  • 066 - 6.9 Describing the Benefits of Device Compliance and Application Control.mp4
    02:08
  • 067 - 6.10 Introducing Network Segmentation.mp4
    01:57
  • 068 - 6.11 Exploring Application-based Segmentation.mp4
    02:15
  • 069 - 6.12 Understanding Cisco ACI.mp4
    03:12
  • 070 - 6.13 Describing Network Access with CoA.mp4
    01:56
  • 071 - 6.14 Integrating Different Security Systems Using pxGrid.mp4
    03:29
  • 072 - 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid - CCNP and CCIE Security Core SCOR 350-7.mp4
    06:47
  • 073 - Module introduction.mp4
    00:31
  • 074 - Learning objectives.mp4
    00:57
  • 075 - 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4
    05:07
  • 076 - 7.2 Configuring and Verifying Port Security.mp4
    03:56
  • 077 - 7.3 Configuring and Verifying DHCP Snooping.mp4
    03:05
  • 078 - 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4
    06:05
  • 079 - 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4
    04:30
  • 080 - 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4
    02:21
  • 081 - 7.7 Understanding and Configuring CDP LLDP.mp4
    02:55
  • 082 - 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4
    05:52
  • 083 - 7.9 Exploring How to Secure the Management Plane.mp4
    05:20
  • 084 - 7.10 Exploring How to Secure the Control Plane.mp4
    06:08
  • 085 - 7.11 Exploring How to Secure the Data Plane.mp4
    04:05
  • 086 - Learning objectives.mp4
    01:15
  • 087 - 8.1 Introducing Cisco Next-Generation Firewalls.mp4
    07:47
  • 088 - 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4
    12:49
  • 089 - 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4
    08:35
  • 090 - 8.4 Implementing Access Control Policies.mp4
    03:43
  • 091 - Learning objectives.mp4
    00:30
  • 092 - 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4
    05:39
  • 093 - 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities - CCNP and CCIE Security Core.mp4
    01:46
  • 094 - 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4
    04:35
  • 095 - Module introduction.mp4
    00:21
  • 096 - Learning objectives.mp4
    00:35
  • 097 - 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4
    08:05
  • 098 - 10.2 Configuring IPsec Site-to-site VPNs.mp4
    02:34
  • 099 - 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4
    03:39
  • 100 - 10.4 Exploring DMVPN.mp4
    07:48
  • 101 - 10.5 Understanding GET VPN.mp4
    06:00
  • 102 - 10.6 Deploying FlexVPN.mp4
    06:59
  • 103 - 10.7 Troubleshooting Site-to-site VPN Implementations.mp4
    05:16
  • 104 - Learning objectives.mp4
    00:42
  • 105 - 11.1 Introducing Remote Access VPNs.mp4
    01:35
  • 106 - 11.2 Exploring Clientless Remote Access VPNs.mp4
    04:43
  • 107 - 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4
    02:50
  • 108 - 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4
    03:41
  • 109 - 11.5 Troubleshooting Remote Access VPN Implementations.mp4
    01:36
  • 110 - Module introduction.mp4
    00:33
  • 111 - Learning objectives.mp4
    00:59
  • 112 - 12.1 Introducing the Different Cloud Deployment and Service Models.mp4
    03:49
  • 113 - 12.2 Surveying Patch Management in the Cloud.mp4
    03:07
  • 114 - 12.3 Performing Security Assessments in Cloud Environments.mp4
    03:15
  • 115 - 12.4 Introducing Agile, DevOps, and CI CD Pipelines.mp4
    08:17
  • 116 - 12.5 Introducing Serverless Computing.mp4
    01:24
  • 117 - 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4
    01:35
  • 118 - 12.7 Exploring the Concepts of DevSecOps.mp4
    04:08
  • 119 - 12.8 Surveying Cisco Umbrella.mp4
    05:19
  • 120 - 12.9 Exploring Cisco Cloud Email Security.mp4
    02:01
  • 121 - 12.10 Exploring Cisco Cloudlock.mp4
    04:52
  • 122 - Learning objectives.mp4
    01:08
  • 123 - 13.1 Introducing Cisco Content Security Solutions.mp4
    03:11
  • 124 - 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4
    03:04
  • 125 - 13.3 Introduction to Cisco Email Security.mp4
    03:34
  • 126 - 13.4 Exploring the Cisco ESA Deployment Model.mp4
    02:21
  • 127 - 13.5 Understanding Email Security Features.mp4
    03:54
  • 128 - 13.6 Discussing Email Security in the Cloud.mp4
    03:39
  • 129 - 13.7 Introduction to Secure Internet Gateway (SIG).mp4
    02:40
  • 130 - 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4
    02:40
  • 131 - 13.9 Exploring Cisco Umbrella Investigate.mp4
    03:47
  • 132 - Module introduction.mp4
    00:18
  • 133 - Learning objectives.mp4
    01:24
  • 134 - 14.1 Introducing AMP for Endpoints.mp4
    02:47
  • 135 - 14.2 Describing AMP for Endpoints Outbreak Control.mp4
    06:03
  • 136 - 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4
    02:51
  • 137 - 14.4 Understanding AMP IP Blacklists and Whitelists.mp4
    03:02
  • 138 - 14.5 Exploring Application Control in AMP for Endpoints.mp4
    01:22
  • 139 - 14.6 Describing AMP for Endpoints Exclusion Sets.mp4
    04:09
  • 140 - 14.7 Introduction to AMP for Endpoints Policies.mp4
    00:53
  • 141 - 14.8 Describing the Anyconnect AMP Enabler.mp4
    00:35
  • 142 - 14.9 Exploring AMP for Endpoints Engines.mp4
    01:29
  • 143 - 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4
    03:44
  • 144 - 14.11 Introducing the Cisco Threat Response Solution.mp4
    02:31
  • 145 - Summary.mp4
    01:40
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 145
    • duration 9:40:31
    • Release Date 2023/11/07

    Courses related to CCNP Enterprise

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Cisco CCNP