Companies Home Search Profile

CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1)

Focused View

6:29:53

85 View
  • 1.1 Introducing the CCNP and CCIE Security Certifications.mp4
    11:46
  • 1.2 Comparing the CCNP and CCIE Security Certifications with Other Cisco Certifications.mp4
    07:34
  • 1.3 Exam Prep Tips.mp4
    04:10
  • 2.1 Cybersecurity Concepts, The NIST Cybersecurity Framework, and Additional NIST Guidance and Documents.mp4
    04:10
  • 2.2 Defining Threats, Vulnerabilities, and Exploits.mp4
    05:52
  • 2.3 An Introduction to Incident Response Part 1.mp4
    06:06
  • 2.4 An Introduction to Incident Response Part 2.mp4
    05:46
  • 2.5 ISOIEC 270022022 and NIST Incident Response Guidance.mp4
    08:17
  • 2.6 Understanding Threat Intelligence.mp4
    10:23
  • 2.7 Understanding Threat Hunting.mp4
    06:24
  • 2.8 Common Software and Hardware Vulnerabilities.mp4
    04:28
  • 2.9 Authentication-based Vulnerabilities and the OWASP Top 10.mp4
    06:17
  • 2.10 Malware Types, Payloads, and Transmission Methods.mp4
    09:31
  • 2.11 Malware Communication Methods, and Infection Mechanisms.mp4
    10:13
  • 2.12 Ransomware, Keyloggers, Spyware, and Tips for Analyzing Malware.mp4
    08:35
  • 2.13 Static Analysis s. Dynamic Analysis.mp4
    04:38
  • 3.1 Traditional Networking Planes and Introduction to Software-Defined Networking.mp4
    09:54
  • 3.2 VXLAN and Network Oerlays.mp4
    05:03
  • 3.3 Micro-Segmentation.mp4
    04:45
  • 3.4 Open-Source Initiaties.mp4
    06:28
  • 3.5 Modern Network Architectures and the Cisco Catalyst Center.mp4
    05:28
  • 3.6 Introduction to the Cisco ACI Solution.mp4
    04:24
  • 3.7 Introduction to Network Programmability, Modern Programming Languages, and Tools.mp4
    06:12
  • 3.8 DeNet Resources and Getting Started with APIs.mp4
    04:10
  • 3.9 YANG Models, NETCONF, and RESTCONF.mp4
    05:53
  • 3.10 OpenConfig and gNMI.mp4
    05:27
  • 4.1 Cloud Serice Models and Security.mp4
    04:32
  • 4.2 DeOps, CICD and DeSecOps.mp4
    06:41
  • 4.3 Container Orchestration and Kubernetes.mp4
    06:14
  • 4.4 Sererless Computing.mp4
    03:29
  • 4.5 Introducing DeSecOps.mp4
    03:41
  • 4.6 Patch Management in the Cloud.mp4
    05:59
  • 4.7 Security Assessment in the Cloud, and Questions to Ask Your Cloud Serice Proider.mp4
    04:09
  • 4.8 The Cisco Umbrella Architecture.mp4
    07:14
  • 4.9 Cisco Secure Email Cloud.mp4
    03:13
  • 4.10 Cisco Secure Cloud Analytics.mp4
    05:16
  • 4.11 AppDynamics, Cloud Monitoring, and Cisco Secure Workload.mp4
    04:03
  • 5.1 Content Security Fundamentals.mp4
    05:34
  • 5.2 Cisco Async Operating System (AsyncOS).mp4
    02:11
  • 5.3 Cisco Secure Web Appliance.mp4
    03:40
  • 5.4 Explicit Forward Mode s. Transparent Mode.mp4
    04:06
  • 5.5 Traffic Redirection with Policy-based Routing.mp4
    06:05
  • 5.6 Cisco Secure Email Threat Defense.mp4
    05:38
  • 5.7 SMTP Authentication and Encryption and DKIM.mp4
    06:38
  • 6.1 Endpoint Threat Detection and Response.mp4
    04:55
  • 6.2 Cisco Secure Endpoint.mp4
    04:26
  • 6.3 Cisco Secure Client.mp4
    04:30
  • 6.4 Cisco XDR.mp4
    06:05
  • 7.1 Introduction to Authentication, Authorization, and Accounting.mp4
    07:11
  • 7.2 Multifactor Authentication and Duo Security.mp4
    07:32
  • 7.3 Understanding the Zero Trust Architecture.mp4
    06:43
  • 7.4 Access Control DAC.mp4
    05:07
  • 7.5 Access Control MAC.mp4
    06:09
  • 7.6 Access Control RBAC.mp4
    01:38
  • 7.7 Access Control ABAC.mp4
    04:14
  • 7.8 AAA Protocols RADIUS, TACACS+, Diameter.mp4
    03:41
  • 7.9 Understanding 802.1X and TrustSec Software-defined Segmentation.mp4
    05:42
  • 7.10 Change of Authorization (CoA).mp4
    02:19
  • 8.1 Cisco Secure Firewalls and Cisco Next-Generation Intrusion Preention Systems.mp4
    09:00
  • 8.2 Network Access Control List and Firewalling.mp4
    07:44
  • 8.3 VLAN ACLs, Security Group Based ACLs, Downloadable ACLs.mp4
    05:01
  • 8.4 Cisco Identity Serices Engine (ISE).mp4
    04:03
  • 8.5 Cisco Platform Exchange Grid (pxGrid).mp4
    06:43
  • 8.6 Cisco ISE Context and Identity Serices; Profiling Serices; and Authorization Rules.mp4
    07:11
  • 9.1 Final Tips for Exam Day.mp4
    02:23
  • 9.2 Where to go now.mp4
    02:54
  • CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Introduction.mp4
    01:44
  • CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Introduction (1).mp4
    01:44
  • CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Summary.mp4
    01:22
  • Learning objecties.mp4
    00:49
  • Learning objecties (1).mp4
    02:04
  • Learning objecties (2).mp4
    01:54
  • Learning objecties (3).mp4
    01:36
  • Learning objecties (4).mp4
    00:38
  • Learning objecties (5).mp4
    00:30
  • Learning objecties (6).mp4
    00:53
  • Learning objecties (7).mp4
    00:50
  • Learning objecties (8).mp4
    00:21
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 78
    • duration 6:29:53
    • English subtitles has
    • Release Date 2024/07/21