CCNP Security Full Package (New 2020)
Focused View
223:52:08
121 View
- 1-Network Security Fundamentals & Concepts
- 1 - Course Introduction.mp402:09
- 2 - Security Principles.mp426:15
- 3 - Security Threats.mp414:55
- 4 - Intrusion Prevention Fundamentals.mp425:21
- 5 - Email Security Fundamentals.mp419:30
- 6 - Web Security Fundamentals.mp422:29
- 7 - Endpoint Security Fundamentals.mp421:57
- 8 - IEEE 802.1x Foundations.mp413:18
- 9 - Bring Your Own Device (BYOD).mp411:39
- 2-Introduction To Content And Endpoint Security
- 1 - Course Introduction.mp403:31
- 2 - Email-Based Threats.mp416:41
- 3 - The Email Pipeline.mp410:55
- 4 - Cisco ESA Introduction & Features.mp417:33
- 5 - Cisco ESA Deployment Options.mp411:50
- 6 - Cisco ESA Processing Rules.mp419:24
- 7 - Email Security Evasion Techniques.mp416:04
- 8 - Email Encryption Techniques.mp418:01
- 9 - Combatting Web-Based Threats Using Cisco WSA & CWS.mp416:44
- 10 - Introduction To WSA Features.mp414:32
- 11 - WSA Deployment Options.mp408:08
- 12-Introduction To WCCP.mp412:05
- 13 - Introducing Cisco Cloud Web Security.mp406:34
- 14 - Cisco CWS Connectors.mp411:59
- 15 - Introduction To Malware.mp403:08
- 16 - Viruses & Worms.mp407:01
- 17 - Bombs, Horses & Backdoors.mp405:39
- 18 - Exploits, Key Loggers, Rootkits & Ransomware.mp409:14
- 19 - Categories Of Endpoint Protection.mp403:09
- 20 - Antivirus & Antimalware.mp414:31
- 21 - Personal Firewall & HIPS.mp411:26
- 22 - Email & Data Encryption.mp407:08
- 23 - VPNs On Endpoints.mp410:59
- 3-Cryptography & PKI
- 1 - Course Introduction.mp409:18
- 2 - Introduction to Cryptography.mp413:19
- 3 - Hashing.mp420:44
- 4 - Symmetric Encryption.mp422:56
- 5 - Asymmetric Encryption.mp412:46
- 6 - Digital Signatures.mp411:11
- 7 - Next Generation Encryption.mp418:01
- 8 - Public Key Infrastructure.mp421:49
- 9 - Enrollment & Revocation.mp414:17
- 10 - PKI Architectures.mp413:54
- 11 - Implementing PKI.mp429:32
- 12 - ASA & PKI.mp411:38
- 4-Cisco Firewall Technologies for Beginners
- 1 - Course Introduction.mp402:02
- 2 - Firewall Technologies.mp419:20
- 3 - Access Lists.mp433:50
- 4 - Zone-Based Firewall.mp428:34
- 5 - Zone-Based Firewall Configuration.mp420:55
- 6 - Cisco ASA Fundamentals.mp418:56
- 7 - ASA Management.mp407:02
- 8 - Configuring Basic ASA Settings.mp422:34
- 9 - ASA Traffic Filtering.mp408:12
- 10 - ASA Network Address Translation (NAT).mp424:50
- 11 - Configuring ASA Policies & NAT.mp424:54
- 12 - ASA Advanced.mp445:08
- 5-Infrastructure Security
- 1 - Instructor Introduction.mp401:19
- 2 - Network Device Architecture.mp406:25
- 3 - Routing Protocol Authentication.mp412:11
- 4 - Implementing Routing Protocol Authentication.mp410:11
- 5 - Route Filtering.mp408:58
- 6 - Control Plane Policing.mp414:47
- 7 - Control Plane Protection.mp415:06
- 8 - Implementing Control Plane Protection.mp414:37
- 9 - Basic CPU Protection Mechanisms.mp409:55
- 10 - Basic Memory Protection Mechanisms 2017.mp407:40
- 11 - Secure Network Management.mp438:28
- 12 - Management Plane Protection.mp404:44
- 13 - SNMP, NTP & Logging.mp449:55
- 14 - The DHCP Protocol.mp417:05
- 15 - DHCPv6.mp411:42
- 16 - The DNS Protocol.mp420:43
- 17 - IP Spoofing Attacks.mp410:57
- 18 - Mitigation Tools ACLs.mp433:49
- 19 - Mitigation Tools URPF.mp429:17
- 20 - DoS Attacks.mp410:49
- 21 - Mitigation Tools TCP Intercept.mp419:23
- 22 - Mitigation Tools Policing.mp407:48
- 23 - Mitigation Tools RTBH.mp426:39
- 24 - IP Options & Security.mp410:22
- 25 - IP Options Attack Mitigation.mp409:47
- 26 - IP Fragmentation.mp412:13
- 27 - IP Fragmentation Attack Mitigation.mp412:11
- 28 - NBAR & NBAR2.mp421:47
- 29 - IPv6 Extension Headers.mp408:54
- 30 - Extension Headers Processing & Security.mp411:28
- 31 - Extension Headers Attacks Mitigation.mp426:22
- 32 - IPv6 Fragmentation.mp417:56
- 33 - IPv6 Fragmentation Attacks Mitigation.mp418:20
- 34 - Neighbor Discovery.mp411:56
- 35 - Neighbor Discovery Messages.mp417:11
- 36 - Secure Neighbor Discovery (SEND) Introduction.mp413:46
- 37 - SEND Operations.mp420:46
- 38 - SEND Configuration.mp432:04
- 39 - Discovery Protocols.mp425:07
- 40 - VLANs & Trunking.mp420:14
- 41 - Spanning Tree Protocol (STP).mp429:22
- 42 - STP Security Features Part I.mp417:30
- 43 - STP Security Features Part II.mp420:43
- 44 - Layer 2 Security Part I.mp445:22
- 45 - Layer 2 Security Part II.mp445:01
- 46 - Private VLANs & Protected Ports.mp419:03
- 47 - Storm Control.mp404:49
- 48 - Wireless Basics.mp419:59
- 49 - Wireless Security.mp415:32
- 50 - Device Hardening ASA.mp411:42
- 51 - Device Hardening IOS.mp411:27
- 52 - Cisco SAFE.mp407:38
- 6-Layer 2 Security
- 1 - Course Introduction.mp402:22
- 2 - Securing Switching.mp431:40
- 3 - Protecting STP.mp417:32
- 4 - Securing DHCP.mp427:44
- 5 - Preventing Spoofing.mp427:23
- 6 - Private VLANs.mp428:38
- 7 - Port-based Traffic Control.mp416:44
- 7-Network Management Security
- 1 - Course Introduction.mp401:58
- 2 - Securing Administrative Access Part 1.mp425:13
- 3 - Securing Administrative Access Part 2.mp415:35
- 4 - Role-Based CLI Access.mp420:02
- 5 - Logging.mp413:43
- 6 - Securing SNMP.mp421:45
- 7 - Securing NTP.mp424:20
- 8-IKEv1 IPsec VPN
- 1 - Course Introduction.mp403:26
- 2 - VPNs, Tunneling & GRE.mp424:08
- 3 - IPsec Overview.mp431:43
- 4 - IPsec Tunneling.mp412:29
- 5 - IPsec on the ASA.mp415:04
- 6 - Implementing L2L IPsec VPN IOS-ASA.mp422:22
- 7 - IOS Advanced IPsec Solutions.mp430:17
- 8 - IPsec & IPv6.mp407:49
- 9-Cisco CCIE Evolving Technologies v1.1
- 1 - Cloud Computing Overview.mp418:15
- 2 - Service Layers of Cloud Computing.mp415:28
- 3 - How Customers Connect to the Cloud.mp411:02
- 4 - Connectivity in Virtualized Networks.mp420:00
- 5 - Software Defined Networking (SDN) Overview.mp412:06
- 6 - SDN Components.mp412:18
- 7 - Internet of Things (IoT).mp414:46
- 11-Content Security
- 1 - The HTTP Protocol.mp416:27
- 2 - Introduction to Cisco Web Security Appliance (WSA).mp412:49
- 3 - Initializing WSA.mp428:23
- 4 - WSA Modes.mp440:38
- 5 - Identification Profiles.mp422:24
- 6 - Access Policies.mp438:06
- 7 - Decryption Policies.mp424:23
- 8 - The SMTP Protocol.mp420:53
- 9 - Introduction to Cisco Email Security Appliance (ESA).mp410:51
- 10 - ESA Command Line.mp409:21
- 11 - The Listener.mp407:43
- 12 - ESA Operations.mp438:34
- 13 - ESA Policies Overview.mp410:20
- 14 - Implementing ESA Policies.mp416:30
- 12-Cisco Umbrella
- 1 - Course Introduction.mp401:34
- 2 - DNS.mp416:33
- 3 - Introduction to Umbrella.mp414:50
- 4 - Deploying Umbrella.mp428:13
- 5 - Introduction to Policies.mp421:28
- 6 - Working with Policies.mp421:32
- 7 - Intelligent Proxy.mp416:09
- 8 - Umbrella Investigate.mp410:42
- 9 - Course Conclusion.mp400:55
- 13-Identity Management
- 1 - Authentication, Authorization & Accounting (AAA) Overview.mp421:47
- 2 - AAA Components & Configuration.mp432:57
- 3 - Introduction to Cisco Access Control Server (ACS).mp423:14
- 4 - Introduction to Cisco Identity Services Engine (ISE).mp411:51
- 5 - AD Integration.mp405:18
- 6 - ISE Policies.mp432:43
- 7 - Administrative Access ISE.mp441:12
- 8 - Administrative Access ACS.mp418:57
- 9 - Introduction to Profiling.mp437:08
- 10 - Change of Authorization (CoA).mp411:20
- 11 - Profiling Probes.mp419:10
- 12 - Enabling Profiling.mp415:55
- 13 - Introduction to IEEE 802.1x.mp424:43
- 14 - 802.1x Authentication Deployment Modes.mp417:19
- 15 - Implementing Wired 802.1x Authentication.mp451:27
- 16 - Implementing Wireless 802.1x Authentication.mp422:04
- 17 - Guest Services.mp414:19
- 18 - Distributed ISE.mp423:20
- 19 - Deploying ISE Multinode.mp419:44
- 14-Security with StealthWatch using NetFlow
- 1 - Introduction to Stealthwatch.mp427:34
- 2 - Basic Stealthwatch System Installation Part 1.mp429:08
- 3 - Basic Stealthwatch System Installation Part 2.mp415:39
- 4 - SMC Configuration.mp424:18
- 5 - Host Groups and User Management.mp430:17
- 6 - Classification of Customer Environment.mp422:05
- 7 - Detecting Indicators of Compromise (IoC) Part 1.mp422:06
- 8 - Detecting Indicators of Compromise (IoC) Part 2.mp423:12
- 9 - SNMP, Storage, Backup & Upgrade.mp425:13
- 15-Implementing Cisco Threat Control Solutions 300-210 SITCS
- 1 - Cisco Content Security Overview.mp410:19
- 2 - Cloud Web Security Features & Functionality.mp416:40
- 3 - Implementation of Features.mp421:34
- 4 - Web Security Appliance Features & Functionality.mp429:02
- 5 - Implementation of Data Security.mp420:32
- 6 - Identity & Authentication.mp415:06
- 7 - Web Usage & AVC.mp415:01
- 8 - Anti-Malware & AMP.mp409:02
- 9 - Decryption Policies.mp406:00
- 10 - Email Security Appliance Features & Functionality.mp418:02
- 11 - Email Encryption & Anti-Spam.mp416:44
- 12 - Virus Filter, Anti-Malware & AMP.mp413:46
- 13 - Inbound Outbound Mail Policies.mp408:24
- 14 - Next-Generation Firewall Overview.mp414:08
- 15 - Access Control Policies.mp415:33
- 16 - Cisco AMP for Networks.mp409:47
- 17 - Public vs. Private Cloud.mp410:16
- 18 - AMP for Endpoints.mp410:47
- 19 - Cisco Web Security Appliance (WSA).mp413:52
- 20 - Cisco Email Security Appliance (ESA).mp408:02
- 21 - Cisco Firepower.mp409:52
- 16-CCNP Security Technology Course 300-206 SENSS
- 1 - Course Introduction.mp429:05
- 2 - Course Topology & Equipment.mp408:27
- 3 - Certification & Exam Preparation Part 1.mp421:09
- 4 - Certification & Exam Preparation Part 2.mp424:47
- 5 - Network Device Planes of Operation -.mp410:17
- 6 - Control Plane Policing Part 1.mp419:35
- 7 - Control Plane Policing Part 2.mp417:43
- 8 - Control Plane Protection.mp422:22
- 9 - Routing Protocol Security.mp427:15
- 10 - Management Plane Protection.mp417:05
- 11 - Secure Device Management.mp428:12
- 12 - SNMP Overview.mp425:22
- 13 - SNMP Configuration Part 1.mp422:42
- 14 - NTP Overview Part 1.mp421:06
- 15 - SNMP Configuration Part 2.mp419:28
- 16 - NTP Overview Part 2.mp415:36
- 17 - NTP Configuration.mp425:03
- 18 - Network Event Logging Part 1.mp416:37
- 19 - Network Event Logging Part 2.mp429:11
- 20 - Netflow Part 1.mp415:13
- 21 - Netflow Part 2.mp420:01
- 22 - AAA Overview Part 1.mp420:59
- 23 - AAA Overview Part 2.mp420:02
- 24 - IOS AAA Configuration Part 1.mp430:13
- 25 - IOS AAA Configuration Part 2.mp423:51
- 26 - ASA AAA Configuration Part 1.mp432:22
- 27 - ASA AAA Configuration Part 2.mp433:27
- 28 - ASA AAA Configuration Part 3.mp429:35
- 29 - Port Security.mp433:58
- 30 - DHCP Snooping Overview Part 1.mp418:47
- 31 - DHCP Snooping Overview Part 2.mp420:51
- 32 - DHCP Snooping Configuration.mp418:41
- 33 - Dynamic ARP Inspection Overview.mp424:03
- 34 - Dynamic ARP Inspection Configuration.mp414:52
- 35 - IP Spoofing Overview.mp429:41
- 36 - IP Spoofing Configuration.mp429:59
- 37 - STP Security Toolkit.mp426:55
- 38 - Storm Control.mp429:25
- 39 - Private VLAN Overview.mp423:37
- 40 - Private VLAN Configuration.mp423:09
- 41 - NAT Overview Part 1.mp418:41
- 42 - NAT Overview Part 2.mp421:38
- 43 - Static NAT Configuration.mp428:14
- 44- Dynamic NAT Configuration.mp427:45
- 45 - Policy NAT Configuration Part 1.mp423:53
- 46 - Policy NAT Configuration Part 2.mp423:54
- 47 - Zone Based Policy Firewall Overview.mp430:21
- 48 - Two Zone Firewall Configuration Part 1.mp423:41
- 49 - Two Zone Firewall Configuration Part 2.mp424:40
- 50 - Two Zone with NAT Firewall Configuration.mp431:53
- 51 - Three Zone Firewall Configuration Part 1.mp419:44
- 52 - Three Zone Firewall Configuration Part 2.mp419:04
- 53 - Zone Based Policy Firewall Tuning Overview.mp424:09
- 54- Zone Based Policy Firewall Tuning Configuration.mp432:30
- 55 - Zone Based Policy Firewall Application Inspection Part 1.mp430:40
- 56 - Zone Based Policy Firewall Application Inspection Part 2.mp427:52
- 57 - Zone Based Policy Firewall Self Zone Part 1.mp421:27
- 58 - Zone Based Policy Firewall Self Zone Part 2.mp420:46
- 59 - ASA Firewall Overview Part 1.mp420:22
- 60 - ASA Firewall Overview Part 2.mp421:21
- 61 - ASA Firewall ACL Overview Part 1.mp421:35
- 62 - ASA Firewall ACL Overview Part 2.mp422:46
- 63 - ASA Firewall ACL Configuration Part 1.mp418:17
- 64 - ASA Firewall ACL Configuration Part 2.mp421:11
- 65 - ASA Firewall Object Groups.mp431:39
- 66 - ASA Identity Firewall Overview Part 1.mp415:05
- 67 - ASA Identity Firewall Overview Part 2.mp422:22
- 68 - ASA Firewall Modular Policy Framework Overview Part 1.mp420:00
- 69 - ASA Firewall Modular Policy Framework Overview Part 2.mp418:38
- 70 - ASA Firewall MPF Advanced Inspections Part 1.mp423:04
- 71 - ASA Firewall MPF Advanced Inspections Part 2.mp422:34
- 72 - ASA Firewall MPF Dynamic Protocol Inspection Part 1.mp421:02
- 73 - ASA Firewall MPF Dynamic Protocol Inspection Part 2.mp422:17
- 74 - ASA Firewall MPF Application Inspection.mp427:54
- 75 - ASA Firewall NAT Overview.mp423:53
- 76 - ASA Firewall Object NAT Configuration.mp430:05
- 77 - ASA Firewall Twice NAT Configuration Part 1.mp420:15
- 78 - ASA Firewall Twice NAT Configuration Part 2.mp418:33
- 1-FTD Next Generation Firewall
- 1 - Introduction to Firepower Systems.mp417:54
- 2 - Managing FTD.mp421:03
- 3 - The Registration.mp414:18
- 4 - Troubleshooting FTD.mp411:18
- 5 - FTD Objects.mp408:49
- 6 - Deployment Modes.mp424:01
- 7 - FTD Initialization & Routing.mp417:15
- 8 - FTD Policies Overview.mp418:40
- 9 - Access Control Policy (ACP).mp432:28
- 10 - Special Policies.mp436:28
- 11 - Security Intelligence (SI).mp427:00
- 12 - URL Filtering.mp425:51
- 13 - Network Discovery.mp418:26
- 14 - File Policy.mp425:52
- 15 - SSL Policy.mp427:26
- 16 - Introduction to Next Generation IPS (NGIPS).mp412:08
- 17 - Snort Variables & Rules.mp423:08
- 18 - Implementing NGIPS.mp428:22
- 2-Firepower Threat Defense (FTD) - Part I
- 1 - Course Introduction.mp421:41
- 2 - Packet Flow Overview.mp414:44
- 3 - Installing a Cisco Firepower Managent Center (FMC) Part 1.mp405:40
- 4 - Installing a Cisco Firepower Managent Center (FMC) Part 2.mp407:51
- 5 - System Configuration.mp416:13
- 6 - Health Policies & Health Alerts.mp408:47
- 7 - Installing FTD on a Cisco 5500-x Part 1.mp412:33
- 8 - Installing FTD on a Cisco 5500-x Part 2.mp416:38
- 9 - FXOS & Chassis Manager.mp413:49
- 10 - Firepower FTD Objects Part 1.mp419:31
- 11 - Firepower FTD Objects Part 2.mp423:33
- 12 - FTD Interface Configuration Part 1.mp413:23
- 13 - FTD Interface Configuration Part 2.mp404:00
- 14 - FTD Routing Configuration.mp411:21
- 15 - FTD Platform Settings.mp427:52
- 16 - Access Control Policy Part 1.mp417:57
- 17 - Access Control Policy Part 2.mp420:59
- 18 - Access Control Policy Part 3.mp432:53
- 19 - FTD PreFilter.mp412:58
- 20 - Network Address Translation (NAT).mp420:48
- 21 - Malware & File Policy.mp421:34
- 22 - IPS Policy Part 1.mp414:31
- 23 - IPS Policy Part 2.mp428:11
- 24 - Firepower Network Discovery.mp418:42
- 25 - Reporting & Task Management.mp421:10
- 26 - Network Analysis Part 1.mp417:07
- 27 - Network Analysis Part 2.mp419:27
- 28 - Network Analysis Part 3.mp423:50
- 29 - User Account Managment.mp416:49
- 30 - Identity Policy.mp414:49
- 3-Firepower Threat Defense (FTD) - Part II
- 1 - Course Introduction.mp403:20
- 2 - External Authentication with RADIUS Overview.mp405:11
- 3 - External Authentication with RADIUS Configuration.mp430:13
- 4 - FlexConfig Overview.mp411:51
- 5 - FlexConfig Configuration.mp428:49
- 6 - High Availability.mp417:41
- 7 - SSL Policy Overview.mp419:30
- 8 - SSL Policy Configuration.mp418:04
- 9 - Quality of Service (QoS).mp407:35
- 10 - Correlation Policy.mp426:40
- 11 - FTD VPN.mp407:03
- 12 - Site-to-Site IPsec IKEv1.mp417:36
- 13 - Remote Access SSL TLS.mp426:16
- 1-Identity Services Engine (ISE)
- 1 - Course Introduction.mp403:08
- 2 - Introduction to Cisco ISE.mp419:44
- 3 - The Policies.mp447:31
- 4 - Integrating with Active Directory.mp403:41
- 5 - AAA Overview.mp416:47
- 6 - AAA Components & Configuration.mp432:30
- 7 - Controlling Administrative Access.mp437:37
- 8 - Introduction to Profiling.mp436:56
- 9 - Change of Authorization.mp411:32
- 10 - Profiling Probes.mp419:20
- 11 - Enabling Profiling.mp415:54
- 12 - 802.1x.mp425:02
- 13 - 802.1x Deployment Modes.mp417:32
- 14 - Implementing Wired 802.1x.mp446:29
- 15 - Implementing Wireless 802.1x - Identity Services Engine (ISE).mp417:30
- 16 - Guest Services.mp414:40
- 17 - Distributed ISE.mp423:32
- 18 - Deploying ISE Multinode.mp419:52
- 19 - Course Conclusion.mp401:05
- 2-Advanced Identity Services Engine (ISE)
- 1 - Course Introduction.mp402:38
- 2 - AD Integration.mp422:29
- 3 - EAP Chaining.mp441:04
- 4 - Advanced Profiling.mp441:38
- 5 - Certificate Services.mp420:01
- 6 - ISE & WSA - pxGrid.mp450:24
- 7 - ISE & FTD - pxGrid.mp451:01
- 3-TrustSec
- 1 - Course Introduction.mp402:32
- 2 - Introduction to TrustSec.mp424:54
- 3 - Classification & SGT.mp415:37
- 4 - Propagation & SXP.mp445:56
- 5 - Enforcement & SGACL.mp416:28
- 6 - TrustSec on IOS.mp451:53
- 7 - TrustSec on ASA.mp423:08
- 8 - TrustSec for Wireless Networks.mp414:17
- 4-Endpoint Services with ISE
- 1 - Course Introduction.mp401:40
- 2 - Client Provisioning.mp411:36
- 3 - Introduction to BYOD.mp425:03
- 4 - BYOD for Wireless Endpoints - Dual SSID.mp415:35
- 5 - Posture Services.mp418:12
- 6 - Enabling Posture Assessment.mp441:12
- 7 - Course Conclusion.mp400:56
- 1-Email Security Appliance
- 1 - Course Introduction.mp402:42
- 2 - SMTP.mp421:15
- 3 - ESA Overview.mp411:24
- 4 - ESA Initialization Part 1.mp417:41
- 5 - ESA Initialization Part 2.mp418:33
- 6 - Email Pipeline.mp410:25
- 7 - Access Tables Part 1.mp419:03
- 8 - Access Tables Part 2.mp419:36
- 9 - Introduction to Policies.mp422:38
- 10 - ESA Policies Part 1.mp428:11
- 11 - ESA Policies Part 2.mp428:24
- 12 - Message Filters.mp415:59
- 2-Content Security
- 1 - The HTTP Protocol.mp416:27
- 2 - Introduction to Cisco Web Security Appliance (WSA).mp412:49
- 3 - Initializing WSA.mp428:23
- 4 - WSA Modes.mp440:38
- 5 - Identification Profiles.mp422:24
- 6 - Access Policies.mp438:06
- 7 - Decryption Policies.mp424:23
- 8 - The SMTP Protocol.mp420:53
- 9 - Introduction to Cisco Email Security Appliance (ESA).mp410:51
- 10 - ESA Command Line.mp409:21
- 11 - The Listener.mp407:43
- 12 - ESA Operations.mp438:34
- 13 - ESA Policies Overview.mp410:20
- 14 - Implementing ESA Policies - Content Security.mp416:30
- 1-Content Security
- 1 - The HTTP Protocol.mp416:27
- 2 - Introduction to Cisco Web Security Appliance (WSA).mp412:49
- 3 - Initializing WSA.mp428:23
- 4 - WSA Modes.mp440:38
- 5 - Identification Profiles.mp422:24
- 6 - Access Policies.mp438:06
- 7 - Decryption Policies.mp424:23
- 8 - The SMTP Protocol.mp420:53
- 9 - Introduction to Cisco Email Security Appliance (ESA).mp410:51
- 10 - ESA Command Line.mp409:21
- 11 - The Listener.mp407:43
- 12 - ESA Operations.mp438:34
- 13 - ESA Policies Overview.mp410:20
- 14 - Implementing ESA Policies.mp416:30
- 2-Advanced Malware Protection
- 1 - Course Introduction.mp402:13
- 2 - Introduction to Advanced Malware Protection.mp414:21
- 3 - AMP Components & Operations.mp424:23
- 4 - AMP on FTD.mp424:39
- 5 - AMP on WSA.mp419:55
- 6 - AMP on ESA.mp416:47
- 3-Web Security Appliance
- 1 - Course Introduction.mp403:49
- 2 - Introduction to the Web Security Appliance.mp410:43
- 3 - System Setup Wizard.mp401:54
- 4 - Web Cache Communication Protocol (WCCP).mp403:25
- 5 - Blocking Global URL Categories.mp404:50
- 6 - Blocking Custom URL.mp406:01
- 7 - Blocking Custom Browsers.mp406:10
- 8 - Blocking Applications.mp403:09
- 9 - Blocking Custom Objects.mp402:52
- 10 - WSA CLI.mp401:56
- 11 - Failover.mp408:16
- 12 - Web Reputation.mp407:12
- 13 - Advanced Web Security.mp406:29
- 14 - PxGrid.mp403:10
- 15 - Course Conclusion.mp401:24
- 1-Cryptography & PKI
- 1 - Course Introduction.mp409:18
- 2 - Introduction to Cryptography.mp413:19
- 3 - Hashing.mp420:44
- 4 - Symmetric Encryption.mp422:56
- 5 - Asymmetric Encryption.mp412:46
- 6 - Digital Signatures.mp411:11
- 7 - Next Generation Encryption.mp418:01
- 8 - Public Key Infrastructure.mp421:49
- 9 - Enrollment & Revocation.mp414:17
- 10 - PKI Architectures.mp413:54
- 11 - Implementing PKI.mp429:32
- 12-ASA & PKI.mp411:38
- 2-IKEv1 IPsec VPN
- 1 - Course Introduction.mp403:26
- 2 - VPNs, Tunneling & GRE.mp424:08
- 3 - IPsec Overview.mp431:43
- 4 - IPsec Tunneling.mp412:29
- 5 - IPsec on the ASA.mp415:04
- 6 - Implementing L2L IPsec VPN IOS-ASA.mp422:22
- 7 - IOS Advanced IPsec Solutions.mp430:17
- 8 - IPsec & IPv6.mp407:49
- 3-Dynamic Multipoint VPN (DMVPN)
- 1 - Course Introduction.mp404:11
- 2 - DMVPN Overview.mp417:41
- 3 - DMVPN Routing.mp424:54
- 4 - DMVPN Phase I.mp416:48
- 5 - Implementing DMVPN Phase I.mp441:45
- 6 - DMVPN Phase II.mp412:18
- 7 - Implementing DMVPN Phase II.mp425:17
- 8 - DMVPN Phase III.mp417:02
- 9 - Implementing DMVPN Phase III.mp413:40
- 10 - DMVPN & IPv6.mp408:49
- 11 - Implementing IPv6 DMVPN.mp419:03
- 12 - DMVPN Dual Hub.mp415:28
- 13 - Implementing DMVPN Dual Hub.mp419:30
- 4-Group Encrypted Transport VPN (GETVPN)
- 1 - Course Introduction.mp404:50
- 2 - GETVPN Overview.mp422:54
- 3 - Implementing GETVPN.mp439:35
- 4 - GETVPN for IPv6.mp423:13
- 5 - COOP KS.mp437:48
- 6 - G-IKEv2.mp430:21
- 5-Secure Connectivity
- 1 - Cryptography Basics.mp431:18
- 2 - Public Key Infrastructure (PKI).mp440:44
- 3 - PKI Configuration.mp427:28
- 4 - Virtual Private Network (VPN) & IPsec.mp448:55
- 5 - IPsec on the ASA.mp413:55
- 6 - IPsec VPN L2L IOS-ASA.mp439:24
- 7 - IPsec VPN L2L Digital Certificates.mp425:02
- 8 - ASA Certificate Maps.mp412:39
- 9 - IOS Advanced IPsec Solutions.mp452:44
- 10 - IPsec for IPv6.mp439:04
- 11 - VRF-Aware IPsec.mp431:19
- 12 - IKE Version 2 Overview.mp415:11
- 13 - Cisco FlexVPN.mp442:10
- 14 - IKEv2 IPsec VPN L2L IOS-ASA.mp418:19
- 15 - Cisco FlexVPN Client-Server.mp438:20
- 16 - The SSL & TLS Protocols.mp419:34
- 17 - Remote Access VPN SSL-TLS.mp414:40
- 18 - Cisco AnyConnect.mp403:37
- 19 - ASA Clientless SSL VPN.mp415:48
- 20 - ASA AnyConnect SSL VPN - Secure Connectivity.mp414:36
- 21 - IOS SSL VPN.mp413:41
- 22 - Introduction to DMVPN.mp441:49
- 23 - Implementing DMVPN.mp449:36
- 24 - DMVPN for IPv6.mp442:12
- 25 - DMVPN Dual Hub.mp410:48
- 26 - Introduction to GETVPN.mp430:42
- 27 - Implementing GETVPN.mp437:23
- 28 - GETVPN for IPv6.mp415:15
- 29 - GETVPN G-IKEv2.mp419:59
- 6-CCNP Security Technology Course 300-209 SIMOS
- 1 - Introduction.mp413:43
- 2 - Course Outline.mp411:07
- 3 - Topology & Equipment.mp417:11
- 4 - CCNP Security Certification & Goals.mp407:09
- 5 - CCNP Security Exam Information.mp409:56
- 6 - CCNP Exam Walkthrough.mp425:13
- 7 - About SIMOS.mp412:20
- 8 - Network Design Myths & DMVPN.mp408:03
- 9 - Study Material & Recommended Books.mp418:59
- 10 - Learning Methodology.mp409:03
- 11 - Recommended Learning Approach.mp409:23
- 12 - Virtual Private Network (VPN).mp417:18
- 13 - Secure VPN.mp417:07
- 14 - VPN Fundamentals.mp421:33
- 15 - Cryptographic Hashing Algorithms.mp411:02
- 16 - Digital Signatures.mp410:05
- 17- Next-Generation Cryptography Encryption.mp413:45
- 18 - VPN Logical Topologies.mp418:48
- 19 - IKEv1 Overview.mp411:00
- 20 - IKEv1 Phase 1.mp416:45
- 21 - IKEv1 Phase 2.mp413:39
- 22 - IKEv1 IPsec Control-Plane & Data-Plane.mp411:34
- 23 - IKEv1 IPsec VPN Types.mp421:18
- 24 - IOS Steps.mp408:30
- 25 - ASA Steps.mp403:28
- 26 - IKEv1 IPsec Crypto-Map Configuration Part 1.mp421:27
- 27 - IKEv1 IPsec Crypto-Map Configuration Part 2.mp414:21
- 28 - IKEv1 IPsec Verification & Troubleshooting Part 1.mp426:31
- 29 - IKEv1 IPsec Verification & Troubleshooting Part 2.mp417:54
- 30 - IKEv1 IPsec Verification & Troubleshooting Part 3.mp408:24
- 31 - IKEv1 IPsec Verification & Troubleshooting Part 4.mp416:36
- 32 - DPD & IKEv1 DPD.mp412:42
- 33 - IPsec Peer Availability Check.mp406:56
- 34 - IKEv1 DPD on IOS.mp404:55
- 35 - DPD Verification Part 1.mp408:16
- 36 - DPD Verification Part 2.mp409:08
- 37 - DPD Verification Part 3.mp411:48
- 38 - NAT-T Overview.mp407:10
- 39 - NAT-T Example.mp417:40
- 40 - GRE with IPsec Option A & B, IPsec Profile.mp408:13
- 41 - GRE with IPsec Example Part 1.mp425:09
- 42 - GRE with IPsec Example Part 2.mp413:41
- 43 - IPsec with SVTI Part 1.mp422:21
- 44 - IPsec with SVTI Part 2.mp411:50
- 45 - DMVPN Fundamentals.mp412:55
- 46- NHRP & Important Messages.mp414:14
- 47 - DMVPN Routing, Spoke to Hub, & Spoke to Spoke.mp413:39
- 48 - DMVPN Phase 1 (Now obsolete) Part 1.mp423:01
- 49 - DMVPN Phase 1 (Now obsolete) Part 2.mp423:35
- 50 - DMVPN Phase 1 (Now obsolete) Part 3.mp427:08
- 51 - DMVPN Phase 2 ( Now Obsolete) Part 1.mp420:19
- 52 - DMVPN Phase 2 ( Now Obsolete) Part 2.mp419:27
- 53 - DMVPN Phase 3 Mandatory Configuration.mp423:20
- 54 - DMVPN & IKEv1sec, DMVPN & Crypto IPsec Profiles.mp408:42
- 55 - IPsec tunnels Part 1.mp426:25
- 56 - IPsec tunnels Part 2.mp424:33
- 57 - GETVPN.mp424:45
- 58 - GETVPN Control-Plane Phases.mp408:36
- 59 - GDOI TEK Rekey.mp407:06
- 60 - GETVPN Logical Topology, Routing, & Connectivity Requirements.mp430:37
- 61 - IKEv2 Fundamentals.mp417:33
- 62 - IKEv2 Configuration Exchange.mp409:46
- 63 - FlexVPN & FlexVPN Building Blocks.mp423:36
- 64 - IKEv2 FlexVPN SVTI with PSK.mp431:04
- 65 - IKEv2 FlexVPN SVTI with PSK (Cont).mp422:29
- 66 - Public Key Infrastructure Overview.mp425:18
- 67 - IKEv2 Flex VPN Configuration Part 1.mp422:17
- 68 - IKEv2 Flex VPN Configuration Part 2.mp411:56
- 68 - IKEv2 Flex VPN Configuration Part 3.mp416:14
- 69 - IKEv2 Flex VPN Configuration Part 4.mp419:32
- 70 - IKEv2 FlexVPN Hub-and-Spoke Part 1.mp419:48
- 71 - IKEv2 FlexVPN Hub-and-Spoke Part 2.mp412:34
- 72 - IKEv2 FlexVPN Hub-and-Spoke Part 3.mp422:58
- 73 - IKEv2 FlexVPN Authorization Policy.mp407:39
- 74 - FlexVPN Hub-Spoke Routing Challenge Part 1.mp414:42
- 75 - FlexVPN Hub-Spoke Routing Challenge Part 2.mp418:06
- 76 - FlexVPN Spoke-to Spoke Part 1.mp422:30
- 77 - FlexVPN Spoke-to Spoke Part 2.mp425:49
- 78 - FlexVPN Spoke-to Spoke Part 3.mp421:20
- 79 - SSL VPN Fundamentals Part 1.mp408:28
- 80 - SSL VPN Fundamentals Part 2.mp411:46
- 81 - AnyConnect Fundamentals.mp414:39
- 82 - ASA VPN Building Blocks.mp424:30
- 83 - Cisco ASA VPN Building Blocks.mp420:48
- 84 - SSL VPN Tunnel-Group Matching.mp412:16
- 86 - ASA Clientless SSL VPN Overview.mp409:52
- 87 - ASA Configuration Steps.mp409:33
- 88 - ASA Verification & Troubleshooting Steps Part 1.mp423:40
- 89 - ASA Verification & Troubleshooting Steps Part 2.mp422:38
- 90 - ASA Verification & Troubleshooting Steps Part 3.mp415:52
- 91 - ASA Verification & Troubleshooting Steps Part 4.mp420:20
- 92 - ASA Clientless SSL VPN Certificate Authentication.mp408:01
- 93 - CA Options & ASA Configuration Steps Part 1.mp419:16
- 94 - CA Options & ASA Configuration Steps Part 2.mp417:18
- 95 - CA Options & ASA Configuration Steps Part 3.mp426:00
- 96 - ASA Clientless SSL VPN Multiple Authentication Part 1.mp424:33
- 97 - ASA Clientless SSL VPN Multiple Authentication Part 2.mp430:11
- 98 - SSL VPN ACL.mp425:56
- 99 - AnyConnect SSL VPN on ASA.mp417:10
- 100 - Additional ASA Verification & Troubleshooting.mp442:14
- 101 - SSL VPN Authorization Options.mp408:04
- 102 - ISE Configuration Steps Part 1.mp414:58
- 103 - ISE Configuration Steps Part 2.mp415:08
- 104 - ISE Configuration Steps Part 3.mp423:13
- 105 - AnyConnect IKEv2 IPsec Part 1.mp423:08
- 106 - AnyConnect IKEv2 IPsec Part 2.mp417:44
- 1-Network Programmability Foundation
- 1 - Course Introduction.mp402:42
- 2 - Data Types - List & Tuple.mp415:32
- 2 - Introduction to Network Programmability Foundation.mp426:33
- 3 - Automation Tools.mp419:37
- 4 - Version Control with Git.mp433:40
- 5 - Distributed Git and GitHub.mp412:39
- 6 - Introduction to Python.mp432:38
- 7 - Basic Python Constructs.mp438:53
- 8 - Data Types - Numbers.mp409:01
- 9 - Data Types - Boolean.mp407:23
- 10 - Data Types - String.mp438:29
- 11 - Data Types - Dictionary.mp415:52
- 12 - Conditionals.mp425:31
- 13 - Loops.mp421:14
- 14 - Functions.mp420:34
- 15 - File Access.mp421:03
- 16 - Classes.mp419:57
- 17 - Modules and Packages.mp416:44
- 18 - Data Formats - JSON.mp410:15
- 19 - Data Formats - XML.mp424:07
- 20 - Data Formats - YAML.mp411:48
- 21 - Introduction to API.mp414:33
- 22 - API Toolset.mp422:20
- 23 - Python Automation with REST API.mp423:28
- 24 - Course Conclusion.mp401:00
- 2-Network Security Automation
- 1 - Course Introduction.mp402:34
- 2 - Firepower APIs.mp412:50
- 3 - ISE & pxGrid APIs.mp411:42
- 4 - Umbrella APIs.mp415:44
- 5 - Content Security APIs.mp409:59
- 6 - Threat Grid APIs.mp411:15
- 7 - FMC API - Introduction.mp422:51
- 8 - FMC API - Automating Authentication.mp433:01
- 9 - FMC API - Manipulating Objects.mp425:27
- 10 - FMC API - Manipulating Policies.mp441:39
- 11 - Umbrella Enforcement API.mp426:12
- 12 - Umbrella Investigate API.mp416:51
- 13 - Course Conclusion.mp401:29
- 1-Network Technologies IPv6
- 1 - Instructor Introduction.mp401:20
- 2 - IPv6 Overview.mp421:23
- 3 - IPv6 Addressing.mp410:33
- 4 - IPv6 Addresses Unicast.mp418:46
- 5 - IPv6 Addresses Multicast Anycast.mp413:39
- 6 - Implementing IPv6.mp408:44
- 7 - IPv6 Subnetting.mp416:00
- 8 - IPv6 Extension Headers.mp408:54
- 9 - EH Processing Security.mp411:28
- 10 - IPv6 Fragmentation.mp417:57
- 11 - ICMPv6.mp406:29
- 12 - Neighbor Discovery.mp411:56
- 13 - Neighbor Discovery Messages.mp417:11
- 14 - IPv6 Address Allocation.mp417:19
- 15 - DHCPv6.mp411:42
- 16 - Implementing DHCPv.mp414:00
- 17 - Additional Resources.mp402:19
- 2-Using INE & VIRL for CCNA, CCNP, and CCIE Preparation
- 1 - Using INE & VIRL - For CCNA, CCNP and CCIE Preparation.mp455:00
- 3-Wireshark Technologies
- 1 - Annotating Files - Wireshark Technologies.mp407:34
- 2 - Navigating the GUI - Wireshark Technologies.mp406:46
- 3 - Network Layers and OSI - Wireshark Technologies.mp425:33
- 4 - UDP & TCP Streams - Wireshark Technologies.mp405:05
- 5 - Protocols - Wireshark Technologies.mp409:04
- 6 - Using the Expert - Wireshark Technologies.mp411:45
- 7 - Window Panes - Wireshark Technologies.mp405:33
- 8 - Expert Advanced Features - Wireshark Technologies.mp408:54
- 9 - Profiles - Wireshark Technologies.mp406:20
- 10 - Routers & Switches - Wireshark Technologies.mp408:25
- 11 - Other Network Hardware - Wireshark Technologies.mp422:25
- 12 - Preferences - Wireshark Technologies.mp408:07
- 13 - Capturing Client Server Response - Wireshark Technologies.mp413:05
- 14 - Protocol Analysis - Wireshark Technologies.mp414:20
- 15 - Saving Captures - Wireshark Technologies.mp410:24
- 16 - Selecting an Interface - Wireshark Technologies.mp404:13
- 17 - Multiple Files - Wireshark Technologies.mp406:08
- 18 - Pre-capture rules - Wireshark Technologies.mp406:34
- 19 - TCP IP - Wireshark Technologies.mp412:11
- 20 - TCP Sequencing and Handshake - Wireshark Technologies.mp409:30
- 21 - Colorizing - Wireshark Technologies.mp405:59
- 22 - Different Formats - Wireshark Technologies.mp404:49
- 23 - Ethernet - Wireshark Technologies.mp406:41
- 24 - Capturing IP Resolution - Wireshark Technologies.mp409:44
- 25 - Capturing Packets - Wireshark Technologies.mp407:36
- 26 - Importing Data - Wireshark Technologies.mp404:17
- 27 - Installing Wireshark - Wireshark Technologies.mp412:01
- 28 - Broadcast Storm - Wireshark Technologies.mp411:20
- 29 - Configuring your PC - Wireshark Technologies.mp407:02
- 30 - Exporting Data - Wireshark Technologies.mp405:34
- 31 - Timestamps and time values - Wireshark Technologies.mp416:42
- 32 - Configuring Wireshark - Wireshark Technologies.mp408:21
- 33 - Merging Data - Wireshark Technologies.mp405:48
- 34 - Navigation - Wireshark Technologies.mp412:14
- 35 - Sample Captures - Wireshark Technologies.mp410:23
- 36 - Reviewing DORA - Wireshark Technologies.mp407:59
- 37 - Setting Filters - Wireshark Technologies.mp411:21
- 38 - Capture Filters - Wireshark Technologies.mp409:02
- 39 - Rogue DHCP Server - Wireshark Technologies.mp408:15
- 40 - Display Filters - Wireshark Technologies.mp409:44
- 41 - Advanced Filters - Wireshark Technologies.mp414:43
- 42 - Capturing DNS - Wireshark Technologies.mp407:34
- 43 - Troubleshooting with Statistics - Wireshark Technologies.mp419:01
- 44 - DNS Resolution Analysis - Wireshark Technologies.mp407:20
- 45 - Flow Graphs - Wireshark Technologies.mp413:05
- 46 - I O Graphs - Wireshark Technologies.mp410:08
- 47 - Capturing HTTP - Wireshark Technologies.mp413:50
- 48 - Command-Line Tools - Wireshark Technologies.mp412:28
- 49 - Poorly Performing Website - Wireshark Technologies.mp411:26
- 50 - Capturing VOIP - Wireshark Technologies.mp406:35
- 51 - Analyzing Poor Voice Quality - Wireshark Technologies.mp406:24
- 52 - Capturing FTP - Wireshark Technologies.mp406:07
- 53 - Analyzing Data Transfer - Wireshark Technologies.mp410:18
- 54 - Capturing Wireless - Wireshark Technologies.mp408:24
- 55 - Analyzing Incorrect SSID - Wireshark Technologies.mp405:21
- 56- Tshark - Wireshark Technologies.mp409:53
More details
User Reviews
Rating
average 0
Focused display

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 736
- duration 223:52:08
- Release Date 2023/08/18