CCNP Security (New 2020) - SCOR
Focused View
89:21:14
149 View
1 - Course Introduction.mp4
02:09
1 - Course Introduction.mp4
03:31
2 - Email-Based Threats.mp4
16:41
3 - The Email Pipeline.mp4
10:55
4 - Cisco ESA Introduction & Features.mp4
17:33
5 - Cisco ESA Deployment Options.mp4
11:50
6 - Cisco ESA Processing Rules.mp4
19:24
7 - Email Security Evasion Techniques.mp4
16:04
8 - Email Encryption Techniques.mp4
18:01
9 - Combatting Web-Based Threats Using Cisco WSA & CWS.mp4
16:44
10 - Introduction To WSA Features.mp4
14:32
11 - WSA Deployment Options.mp4
08:08
12-Introduction To WCCP.mp4
12:05
13 - Introducing Cisco Cloud Web Security.mp4
06:34
14 - Cisco CWS Connectors.mp4
11:59
15 - Introduction To Malware.mp4
03:08
16 - Viruses & Worms.mp4
07:01
17 - Bombs, Horses & Backdoors.mp4
05:39
18 - Exploits, Key Loggers, Rootkits & Ransomware.mp4
09:14
19 - Categories Of Endpoint Protection.mp4
03:09
20 - Antivirus & Antimalware.mp4
14:31
21 - Personal Firewall & HIPS.mp4
11:26
22 - Email & Data Encryption.mp4
07:08
23 - VPNs On Endpoints.mp4
10:59
1 - Course Introduction.mp4
09:18
2 - Introduction to Cryptography.mp4
13:19
3 - Hashing.mp4
20:44
4 - Symmetric Encryption.mp4
22:56
5 - Asymmetric Encryption.mp4
12:46
6 - Digital Signatures.mp4
11:11
7 - Next Generation Encryption.mp4
18:01
8 - Public Key Infrastructure.mp4
21:49
9 - Enrollment & Revocation.mp4
14:17
10 - PKI Architectures.mp4
13:54
11 - Implementing PKI.mp4
29:32
12 - ASA & PKI.mp4
11:38
1 - Course Introduction.mp4
02:02
2 - Firewall Technologies.mp4
19:20
3 - Access Lists.mp4
33:50
4 - Zone-Based Firewall.mp4
28:34
5 - Zone-Based Firewall Configuration.mp4
20:55
6 - Cisco ASA Fundamentals.mp4
18:56
7 - ASA Management.mp4
07:02
8 - Configuring Basic ASA Settings.mp4
22:34
9 - ASA Traffic Filtering.mp4
08:12
10 - ASA Network Address Translation (NAT).mp4
24:50
11 - Configuring ASA Policies & NAT.mp4
24:54
12 - ASA Advanced.mp4
45:08
1 - Instructor Introduction.mp4
01:19
2 - Network Device Architecture.mp4
06:25
3 - Routing Protocol Authentication.mp4
12:11
4 - Implementing Routing Protocol Authentication.mp4
10:11
5 - Route Filtering.mp4
08:58
6 - Control Plane Policing.mp4
14:47
7 - Control Plane Protection.mp4
15:06
8 - Implementing Control Plane Protection.mp4
14:37
9 - Basic CPU Protection Mechanisms.mp4
09:55
10 - Basic Memory Protection Mechanisms 2017.mp4
07:40
11 - Secure Network Management.mp4
38:28
12 - Management Plane Protection.mp4
04:44
13 - SNMP, NTP & Logging.mp4
49:55
14 - The DHCP Protocol.mp4
17:05
15 - DHCPv6.mp4
11:42
16 - The DNS Protocol.mp4
20:43
17 - IP Spoofing Attacks.mp4
10:57
18 - Mitigation Tools ACLs.mp4
33:49
19 - Mitigation Tools URPF.mp4
29:17
20 - DoS Attacks.mp4
10:49
21 - Mitigation Tools TCP Intercept.mp4
19:23
22 - Mitigation Tools Policing.mp4
07:48
23 - Mitigation Tools RTBH.mp4
26:39
24 - IP Options & Security.mp4
10:22
25 - IP Options Attack Mitigation.mp4
09:47
26 - IP Fragmentation.mp4
12:13
27 - IP Fragmentation Attack Mitigation.mp4
12:11
28 - NBAR & NBAR2.mp4
21:47
29 - IPv6 Extension Headers.mp4
08:54
30 - Extension Headers Processing & Security.mp4
11:28
31 - Extension Headers Attacks Mitigation.mp4
26:22
32 - IPv6 Fragmentation.mp4
17:56
33 - IPv6 Fragmentation Attacks Mitigation.mp4
18:20
34 - Neighbor Discovery.mp4
11:56
35 - Neighbor Discovery Messages.mp4
17:11
36 - Secure Neighbor Discovery (SEND) Introduction.mp4
13:46
37 - SEND Operations.mp4
20:46
38 - SEND Configuration.mp4
32:04
39 - Discovery Protocols.mp4
25:07
40 - VLANs & Trunking.mp4
20:14
41 - Spanning Tree Protocol (STP).mp4
29:22
42 - STP Security Features Part I.mp4
17:30
43 - STP Security Features Part II.mp4
20:43
44 - Layer 2 Security Part I.mp4
45:22
45 - Layer 2 Security Part II.mp4
45:01
46 - Private VLANs & Protected Ports.mp4
19:03
47 - Storm Control.mp4
04:49
48 - Wireless Basics.mp4
19:59
49 - Wireless Security.mp4
15:32
50 - Device Hardening ASA.mp4
11:42
51 - Device Hardening IOS.mp4
11:27
52 - Cisco SAFE.mp4
07:38
1 - Course Introduction.mp4
02:22
2 - Securing Switching.mp4
31:40
3 - Protecting STP.mp4
17:32
4 - Securing DHCP.mp4
27:44
5 - Preventing Spoofing.mp4
27:23
6 - Private VLANs.mp4
28:38
7 - Port-based Traffic Control.mp4
16:44
1 - Course Introduction.mp4
01:58
2 - Securing Administrative Access Part 1.mp4
25:13
3 - Securing Administrative Access Part 2.mp4
15:35
4 - Role-Based CLI Access.mp4
20:02
5 - Logging.mp4
13:43
6 - Securing SNMP.mp4
21:45
7 - Securing NTP.mp4
24:20
1 - Course Introduction.mp4
03:26
2 - VPNs, Tunneling & GRE.mp4
24:08
3 - IPsec Overview.mp4
31:43
4 - IPsec Tunneling.mp4
12:29
5 - IPsec on the ASA.mp4
15:04
6 - Implementing L2L IPsec VPN IOS-ASA.mp4
22:22
7 - IOS Advanced IPsec Solutions.mp4
30:17
8 - IPsec & IPv6.mp4
07:49
1 - Cloud Computing Overview.mp4
18:15
2 - Service Layers of Cloud Computing.mp4
15:28
3 - How Customers Connect to the Cloud.mp4
11:02
4 - Connectivity in Virtualized Networks.mp4
20:00
5 - Software Defined Networking (SDN) Overview.mp4
12:06
6 - SDN Components.mp4
12:18
7 - Internet of Things (IoT).mp4
14:46
1 - The HTTP Protocol.mp4
16:27
2 - Introduction to Cisco Web Security Appliance (WSA).mp4
12:49
3 - Initializing WSA.mp4
28:23
4 - WSA Modes.mp4
40:38
5 - Identification Profiles.mp4
22:24
6 - Access Policies.mp4
38:06
7 - Decryption Policies.mp4
24:23
8 - The SMTP Protocol.mp4
20:53
9 - Introduction to Cisco Email Security Appliance (ESA).mp4
10:51
10 - ESA Command Line.mp4
09:21
11 - The Listener.mp4
07:43
12 - ESA Operations.mp4
38:34
13 - ESA Policies Overview.mp4
10:20
14 - Implementing ESA Policies.mp4
16:30
1 - Course Introduction.mp4
01:34
2 - DNS.mp4
16:33
3 - Introduction to Umbrella.mp4
14:50
4 - Deploying Umbrella.mp4
28:13
5 - Introduction to Policies.mp4
21:28
6 - Working with Policies.mp4
21:32
7 - Intelligent Proxy.mp4
16:09
8 - Umbrella Investigate.mp4
10:42
9 - Course Conclusion.mp4
00:55
1 - Authentication, Authorization & Accounting (AAA) Overview.mp4
21:47
2 - AAA Components & Configuration.mp4
32:57
3 - Introduction to Cisco Access Control Server (ACS).mp4
23:14
4 - Introduction to Cisco Identity Services Engine (ISE).mp4
11:51
5 - AD Integration.mp4
05:18
6 - ISE Policies.mp4
32:43
7 - Administrative Access ISE.mp4
41:12
8 - Administrative Access ACS.mp4
18:57
9 - Introduction to Profiling.mp4
37:08
10 - Change of Authorization (CoA).mp4
11:20
11 - Profiling Probes.mp4
19:10
12 - Enabling Profiling.mp4
15:55
13 - Introduction to IEEE 802.1x.mp4
24:43
14 - 802.1x Authentication Deployment Modes.mp4
17:19
15 - Implementing Wired 802.1x Authentication.mp4
51:27
16 - Implementing Wireless 802.1x Authentication.mp4
22:04
17 - Guest Services.mp4
14:19
18 - Distributed ISE.mp4
23:20
19 - Deploying ISE Multinode.mp4
19:44
1 - Introduction to Stealthwatch.mp4
27:34
2 - Basic Stealthwatch System Installation Part 1.mp4
29:08
3 - Basic Stealthwatch System Installation Part 2.mp4
15:39
4 - SMC Configuration.mp4
24:18
5 - Host Groups and User Management.mp4
30:17
6 - Classification of Customer Environment.mp4
22:05
7 - Detecting Indicators of Compromise (IoC) Part 1.mp4
22:06
8 - Detecting Indicators of Compromise (IoC) Part 2.mp4
23:12
9 - SNMP, Storage, Backup & Upgrade.mp4
25:13
1 - Cisco Content Security Overview.mp4
10:19
2 - Cloud Web Security Features & Functionality.mp4
16:40
3 - Implementation of Features.mp4
21:34
4 - Web Security Appliance Features & Functionality.mp4
29:02
5 - Implementation of Data Security.mp4
20:32
6 - Identity & Authentication.mp4
15:06
7 - Web Usage & AVC.mp4
15:01
8 - Anti-Malware & AMP.mp4
09:02
9 - Decryption Policies.mp4
06:00
10 - Email Security Appliance Features & Functionality.mp4
18:02
11 - Email Encryption & Anti-Spam.mp4
16:44
12 - Virus Filter, Anti-Malware & AMP.mp4
13:46
13 - Inbound Outbound Mail Policies.mp4
08:24
14 - Next-Generation Firewall Overview.mp4
14:08
15 - Access Control Policies.mp4
15:33
16 - Cisco AMP for Networks.mp4
09:47
17 - Public vs. Private Cloud.mp4
10:16
18 - AMP for Endpoints.mp4
10:47
19 - Cisco Web Security Appliance (WSA).mp4
13:52
20 - Cisco Email Security Appliance (ESA).mp4
08:02
21 - Cisco Firepower.mp4
09:52
1 - Course Introduction.mp4
29:05
2 - Course Topology & Equipment.mp4
08:27
3 - Certification & Exam Preparation Part 1.mp4
21:09
4 - Certification & Exam Preparation Part 2.mp4
24:47
5 - Network Device Planes of Operation -.mp4
10:17
6 - Control Plane Policing Part 1.mp4
19:35
7 - Control Plane Policing Part 2.mp4
17:43
8 - Control Plane Protection.mp4
22:22
9 - Routing Protocol Security.mp4
27:15
10 - Management Plane Protection.mp4
17:05
11 - Secure Device Management.mp4
28:12
12 - SNMP Overview.mp4
25:22
13 - SNMP Configuration Part 1.mp4
22:42
14 - NTP Overview Part 1.mp4
21:06
15 - SNMP Configuration Part 2.mp4
19:28
16 - NTP Overview Part 2.mp4
15:36
17 - NTP Configuration.mp4
25:03
18 - Network Event Logging Part 1.mp4
16:37
19 - Network Event Logging Part 2.mp4
29:11
20 - Netflow Part 1.mp4
15:13
21 - Netflow Part 2.mp4
20:01
22 - AAA Overview Part 1.mp4
20:59
23 - AAA Overview Part 2.mp4
20:02
24 - IOS AAA Configuration Part 1.mp4
30:13
25 - IOS AAA Configuration Part 2.mp4
23:51
26 - ASA AAA Configuration Part 1.mp4
32:22
27 - ASA AAA Configuration Part 2.mp4
33:27
28 - ASA AAA Configuration Part 3.mp4
29:35
29 - Port Security.mp4
33:58
30 - DHCP Snooping Overview Part 1.mp4
18:47
31 - DHCP Snooping Overview Part 2.mp4
20:51
32 - DHCP Snooping Configuration.mp4
18:41
33 - Dynamic ARP Inspection Overview.mp4
24:03
34 - Dynamic ARP Inspection Configuration.mp4
14:52
35 - IP Spoofing Overview.mp4
29:41
36 - IP Spoofing Configuration.mp4
29:59
37 - STP Security Toolkit.mp4
26:55
38 - Storm Control.mp4
29:25
39 - Private VLAN Overview.mp4
23:37
40 - Private VLAN Configuration.mp4
23:09
41 - NAT Overview Part 1.mp4
18:41
42 - NAT Overview Part 2.mp4
21:38
43 - Static NAT Configuration.mp4
28:14
44- Dynamic NAT Configuration.mp4
27:45
45 - Policy NAT Configuration Part 1.mp4
23:53
46 - Policy NAT Configuration Part 2.mp4
23:54
47 - Zone Based Policy Firewall Overview.mp4
30:21
48 - Two Zone Firewall Configuration Part 1.mp4
23:41
49 - Two Zone Firewall Configuration Part 2.mp4
24:40
50 - Two Zone with NAT Firewall Configuration.mp4
31:53
51 - Three Zone Firewall Configuration Part 1.mp4
19:44
52 - Three Zone Firewall Configuration Part 2.mp4
19:04
53 - Zone Based Policy Firewall Tuning Overview.mp4
24:09
54- Zone Based Policy Firewall Tuning Configuration.mp4
32:30
55 - Zone Based Policy Firewall Application Inspection Part 1.mp4
30:40
56 - Zone Based Policy Firewall Application Inspection Part 2.mp4
27:52
57 - Zone Based Policy Firewall Self Zone Part 1.mp4
21:27
58 - Zone Based Policy Firewall Self Zone Part 2.mp4
20:46
59 - ASA Firewall Overview Part 1.mp4
20:22
60 - ASA Firewall Overview Part 2.mp4
21:21
61 - ASA Firewall ACL Overview Part 1.mp4
21:35
62 - ASA Firewall ACL Overview Part 2.mp4
22:46
63 - ASA Firewall ACL Configuration Part 1.mp4
18:17
64 - ASA Firewall ACL Configuration Part 2.mp4
21:11
65 - ASA Firewall Object Groups.mp4
31:39
66 - ASA Identity Firewall Overview Part 1.mp4
15:05
67 - ASA Identity Firewall Overview Part 2.mp4
22:22
68 - ASA Firewall Modular Policy Framework Overview Part 1.mp4
20:00
69 - ASA Firewall Modular Policy Framework Overview Part 2.mp4
18:38
70 - ASA Firewall MPF Advanced Inspections Part 1.mp4
23:04
71 - ASA Firewall MPF Advanced Inspections Part 2.mp4
22:34
72 - ASA Firewall MPF Dynamic Protocol Inspection Part 1.mp4
21:02
73 - ASA Firewall MPF Dynamic Protocol Inspection Part 2.mp4
22:17
74 - ASA Firewall MPF Application Inspection.mp4
27:54
75 - ASA Firewall NAT Overview.mp4
23:53
76 - ASA Firewall Object NAT Configuration.mp4
30:05
77 - ASA Firewall Twice NAT Configuration Part 1.mp4
20:15
78 - ASA Firewall Twice NAT Configuration Part 2.mp4
18:33
More details
User Reviews
Rating
average 0
Focused display

INE
View courses INEINE: Expert IT Training for Networking, Cyber Security and Cloud
INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
- language english
- Training sessions 279
- duration 89:21:14
- Release Date 2023/08/18