Companies Home Search Profile

CCNP Security (New 2020) - SCOR

Focused View

89:21:14

149 View
  • 1 - Course Introduction.mp4
    02:09
  • 1 - Course Introduction.mp4
    03:31
  • 2 - Email-Based Threats.mp4
    16:41
  • 3 - The Email Pipeline.mp4
    10:55
  • 4 - Cisco ESA Introduction & Features.mp4
    17:33
  • 5 - Cisco ESA Deployment Options.mp4
    11:50
  • 6 - Cisco ESA Processing Rules.mp4
    19:24
  • 7 - Email Security Evasion Techniques.mp4
    16:04
  • 8 - Email Encryption Techniques.mp4
    18:01
  • 9 - Combatting Web-Based Threats Using Cisco WSA & CWS.mp4
    16:44
  • 10 - Introduction To WSA Features.mp4
    14:32
  • 11 - WSA Deployment Options.mp4
    08:08
  • 12-Introduction To WCCP.mp4
    12:05
  • 13 - Introducing Cisco Cloud Web Security.mp4
    06:34
  • 14 - Cisco CWS Connectors.mp4
    11:59
  • 15 - Introduction To Malware.mp4
    03:08
  • 16 - Viruses & Worms.mp4
    07:01
  • 17 - Bombs, Horses & Backdoors.mp4
    05:39
  • 18 - Exploits, Key Loggers, Rootkits & Ransomware.mp4
    09:14
  • 19 - Categories Of Endpoint Protection.mp4
    03:09
  • 20 - Antivirus & Antimalware.mp4
    14:31
  • 21 - Personal Firewall & HIPS.mp4
    11:26
  • 22 - Email & Data Encryption.mp4
    07:08
  • 23 - VPNs On Endpoints.mp4
    10:59
  • 1 - Course Introduction.mp4
    09:18
  • 2 - Introduction to Cryptography.mp4
    13:19
  • 3 - Hashing.mp4
    20:44
  • 4 - Symmetric Encryption.mp4
    22:56
  • 5 - Asymmetric Encryption.mp4
    12:46
  • 6 - Digital Signatures.mp4
    11:11
  • 7 - Next Generation Encryption.mp4
    18:01
  • 8 - Public Key Infrastructure.mp4
    21:49
  • 9 - Enrollment & Revocation.mp4
    14:17
  • 10 - PKI Architectures.mp4
    13:54
  • 11 - Implementing PKI.mp4
    29:32
  • 12 - ASA & PKI.mp4
    11:38
  • 1 - Course Introduction.mp4
    02:02
  • 2 - Firewall Technologies.mp4
    19:20
  • 3 - Access Lists.mp4
    33:50
  • 4 - Zone-Based Firewall.mp4
    28:34
  • 5 - Zone-Based Firewall Configuration.mp4
    20:55
  • 6 - Cisco ASA Fundamentals.mp4
    18:56
  • 7 - ASA Management.mp4
    07:02
  • 8 - Configuring Basic ASA Settings.mp4
    22:34
  • 9 - ASA Traffic Filtering.mp4
    08:12
  • 10 - ASA Network Address Translation (NAT).mp4
    24:50
  • 11 - Configuring ASA Policies & NAT.mp4
    24:54
  • 12 - ASA Advanced.mp4
    45:08
  • 1 - Instructor Introduction.mp4
    01:19
  • 2 - Network Device Architecture.mp4
    06:25
  • 3 - Routing Protocol Authentication.mp4
    12:11
  • 4 - Implementing Routing Protocol Authentication.mp4
    10:11
  • 5 - Route Filtering.mp4
    08:58
  • 6 - Control Plane Policing.mp4
    14:47
  • 7 - Control Plane Protection.mp4
    15:06
  • 8 - Implementing Control Plane Protection.mp4
    14:37
  • 9 - Basic CPU Protection Mechanisms.mp4
    09:55
  • 10 - Basic Memory Protection Mechanisms 2017.mp4
    07:40
  • 11 - Secure Network Management.mp4
    38:28
  • 12 - Management Plane Protection.mp4
    04:44
  • 13 - SNMP, NTP & Logging.mp4
    49:55
  • 14 - The DHCP Protocol.mp4
    17:05
  • 15 - DHCPv6.mp4
    11:42
  • 16 - The DNS Protocol.mp4
    20:43
  • 17 - IP Spoofing Attacks.mp4
    10:57
  • 18 - Mitigation Tools ACLs.mp4
    33:49
  • 19 - Mitigation Tools URPF.mp4
    29:17
  • 20 - DoS Attacks.mp4
    10:49
  • 21 - Mitigation Tools TCP Intercept.mp4
    19:23
  • 22 - Mitigation Tools Policing.mp4
    07:48
  • 23 - Mitigation Tools RTBH.mp4
    26:39
  • 24 - IP Options & Security.mp4
    10:22
  • 25 - IP Options Attack Mitigation.mp4
    09:47
  • 26 - IP Fragmentation.mp4
    12:13
  • 27 - IP Fragmentation Attack Mitigation.mp4
    12:11
  • 28 - NBAR & NBAR2.mp4
    21:47
  • 29 - IPv6 Extension Headers.mp4
    08:54
  • 30 - Extension Headers Processing & Security.mp4
    11:28
  • 31 - Extension Headers Attacks Mitigation.mp4
    26:22
  • 32 - IPv6 Fragmentation.mp4
    17:56
  • 33 - IPv6 Fragmentation Attacks Mitigation.mp4
    18:20
  • 34 - Neighbor Discovery.mp4
    11:56
  • 35 - Neighbor Discovery Messages.mp4
    17:11
  • 36 - Secure Neighbor Discovery (SEND) Introduction.mp4
    13:46
  • 37 - SEND Operations.mp4
    20:46
  • 38 - SEND Configuration.mp4
    32:04
  • 39 - Discovery Protocols.mp4
    25:07
  • 40 - VLANs & Trunking.mp4
    20:14
  • 41 - Spanning Tree Protocol (STP).mp4
    29:22
  • 42 - STP Security Features Part I.mp4
    17:30
  • 43 - STP Security Features Part II.mp4
    20:43
  • 44 - Layer 2 Security Part I.mp4
    45:22
  • 45 - Layer 2 Security Part II.mp4
    45:01
  • 46 - Private VLANs & Protected Ports.mp4
    19:03
  • 47 - Storm Control.mp4
    04:49
  • 48 - Wireless Basics.mp4
    19:59
  • 49 - Wireless Security.mp4
    15:32
  • 50 - Device Hardening ASA.mp4
    11:42
  • 51 - Device Hardening IOS.mp4
    11:27
  • 52 - Cisco SAFE.mp4
    07:38
  • 1 - Course Introduction.mp4
    02:22
  • 2 - Securing Switching.mp4
    31:40
  • 3 - Protecting STP.mp4
    17:32
  • 4 - Securing DHCP.mp4
    27:44
  • 5 - Preventing Spoofing.mp4
    27:23
  • 6 - Private VLANs.mp4
    28:38
  • 7 - Port-based Traffic Control.mp4
    16:44
  • 1 - Course Introduction.mp4
    01:58
  • 2 - Securing Administrative Access Part 1.mp4
    25:13
  • 3 - Securing Administrative Access Part 2.mp4
    15:35
  • 4 - Role-Based CLI Access.mp4
    20:02
  • 5 - Logging.mp4
    13:43
  • 6 - Securing SNMP.mp4
    21:45
  • 7 - Securing NTP.mp4
    24:20
  • 1 - Course Introduction.mp4
    03:26
  • 2 - VPNs, Tunneling & GRE.mp4
    24:08
  • 3 - IPsec Overview.mp4
    31:43
  • 4 - IPsec Tunneling.mp4
    12:29
  • 5 - IPsec on the ASA.mp4
    15:04
  • 6 - Implementing L2L IPsec VPN IOS-ASA.mp4
    22:22
  • 7 - IOS Advanced IPsec Solutions.mp4
    30:17
  • 8 - IPsec & IPv6.mp4
    07:49
  • 1 - Cloud Computing Overview.mp4
    18:15
  • 2 - Service Layers of Cloud Computing.mp4
    15:28
  • 3 - How Customers Connect to the Cloud.mp4
    11:02
  • 4 - Connectivity in Virtualized Networks.mp4
    20:00
  • 5 - Software Defined Networking (SDN) Overview.mp4
    12:06
  • 6 - SDN Components.mp4
    12:18
  • 7 - Internet of Things (IoT).mp4
    14:46
  • 1 - The HTTP Protocol.mp4
    16:27
  • 2 - Introduction to Cisco Web Security Appliance (WSA).mp4
    12:49
  • 3 - Initializing WSA.mp4
    28:23
  • 4 - WSA Modes.mp4
    40:38
  • 5 - Identification Profiles.mp4
    22:24
  • 6 - Access Policies.mp4
    38:06
  • 7 - Decryption Policies.mp4
    24:23
  • 8 - The SMTP Protocol.mp4
    20:53
  • 9 - Introduction to Cisco Email Security Appliance (ESA).mp4
    10:51
  • 10 - ESA Command Line.mp4
    09:21
  • 11 - The Listener.mp4
    07:43
  • 12 - ESA Operations.mp4
    38:34
  • 13 - ESA Policies Overview.mp4
    10:20
  • 14 - Implementing ESA Policies.mp4
    16:30
  • 1 - Course Introduction.mp4
    01:34
  • 2 - DNS.mp4
    16:33
  • 3 - Introduction to Umbrella.mp4
    14:50
  • 4 - Deploying Umbrella.mp4
    28:13
  • 5 - Introduction to Policies.mp4
    21:28
  • 6 - Working with Policies.mp4
    21:32
  • 7 - Intelligent Proxy.mp4
    16:09
  • 8 - Umbrella Investigate.mp4
    10:42
  • 9 - Course Conclusion.mp4
    00:55
  • 1 - Authentication, Authorization & Accounting (AAA) Overview.mp4
    21:47
  • 2 - AAA Components & Configuration.mp4
    32:57
  • 3 - Introduction to Cisco Access Control Server (ACS).mp4
    23:14
  • 4 - Introduction to Cisco Identity Services Engine (ISE).mp4
    11:51
  • 5 - AD Integration.mp4
    05:18
  • 6 - ISE Policies.mp4
    32:43
  • 7 - Administrative Access ISE.mp4
    41:12
  • 8 - Administrative Access ACS.mp4
    18:57
  • 9 - Introduction to Profiling.mp4
    37:08
  • 10 - Change of Authorization (CoA).mp4
    11:20
  • 11 - Profiling Probes.mp4
    19:10
  • 12 - Enabling Profiling.mp4
    15:55
  • 13 - Introduction to IEEE 802.1x.mp4
    24:43
  • 14 - 802.1x Authentication Deployment Modes.mp4
    17:19
  • 15 - Implementing Wired 802.1x Authentication.mp4
    51:27
  • 16 - Implementing Wireless 802.1x Authentication.mp4
    22:04
  • 17 - Guest Services.mp4
    14:19
  • 18 - Distributed ISE.mp4
    23:20
  • 19 - Deploying ISE Multinode.mp4
    19:44
  • 1 - Introduction to Stealthwatch.mp4
    27:34
  • 2 - Basic Stealthwatch System Installation Part 1.mp4
    29:08
  • 3 - Basic Stealthwatch System Installation Part 2.mp4
    15:39
  • 4 - SMC Configuration.mp4
    24:18
  • 5 - Host Groups and User Management.mp4
    30:17
  • 6 - Classification of Customer Environment.mp4
    22:05
  • 7 - Detecting Indicators of Compromise (IoC) Part 1.mp4
    22:06
  • 8 - Detecting Indicators of Compromise (IoC) Part 2.mp4
    23:12
  • 9 - SNMP, Storage, Backup & Upgrade.mp4
    25:13
  • 1 - Cisco Content Security Overview.mp4
    10:19
  • 2 - Cloud Web Security Features & Functionality.mp4
    16:40
  • 3 - Implementation of Features.mp4
    21:34
  • 4 - Web Security Appliance Features & Functionality.mp4
    29:02
  • 5 - Implementation of Data Security.mp4
    20:32
  • 6 - Identity & Authentication.mp4
    15:06
  • 7 - Web Usage & AVC.mp4
    15:01
  • 8 - Anti-Malware & AMP.mp4
    09:02
  • 9 - Decryption Policies.mp4
    06:00
  • 10 - Email Security Appliance Features & Functionality.mp4
    18:02
  • 11 - Email Encryption & Anti-Spam.mp4
    16:44
  • 12 - Virus Filter, Anti-Malware & AMP.mp4
    13:46
  • 13 - Inbound Outbound Mail Policies.mp4
    08:24
  • 14 - Next-Generation Firewall Overview.mp4
    14:08
  • 15 - Access Control Policies.mp4
    15:33
  • 16 - Cisco AMP for Networks.mp4
    09:47
  • 17 - Public vs. Private Cloud.mp4
    10:16
  • 18 - AMP for Endpoints.mp4
    10:47
  • 19 - Cisco Web Security Appliance (WSA).mp4
    13:52
  • 20 - Cisco Email Security Appliance (ESA).mp4
    08:02
  • 21 - Cisco Firepower.mp4
    09:52
  • 1 - Course Introduction.mp4
    29:05
  • 2 - Course Topology & Equipment.mp4
    08:27
  • 3 - Certification & Exam Preparation Part 1.mp4
    21:09
  • 4 - Certification & Exam Preparation Part 2.mp4
    24:47
  • 5 - Network Device Planes of Operation -.mp4
    10:17
  • 6 - Control Plane Policing Part 1.mp4
    19:35
  • 7 - Control Plane Policing Part 2.mp4
    17:43
  • 8 - Control Plane Protection.mp4
    22:22
  • 9 - Routing Protocol Security.mp4
    27:15
  • 10 - Management Plane Protection.mp4
    17:05
  • 11 - Secure Device Management.mp4
    28:12
  • 12 - SNMP Overview.mp4
    25:22
  • 13 - SNMP Configuration Part 1.mp4
    22:42
  • 14 - NTP Overview Part 1.mp4
    21:06
  • 15 - SNMP Configuration Part 2.mp4
    19:28
  • 16 - NTP Overview Part 2.mp4
    15:36
  • 17 - NTP Configuration.mp4
    25:03
  • 18 - Network Event Logging Part 1.mp4
    16:37
  • 19 - Network Event Logging Part 2.mp4
    29:11
  • 20 - Netflow Part 1.mp4
    15:13
  • 21 - Netflow Part 2.mp4
    20:01
  • 22 - AAA Overview Part 1.mp4
    20:59
  • 23 - AAA Overview Part 2.mp4
    20:02
  • 24 - IOS AAA Configuration Part 1.mp4
    30:13
  • 25 - IOS AAA Configuration Part 2.mp4
    23:51
  • 26 - ASA AAA Configuration Part 1.mp4
    32:22
  • 27 - ASA AAA Configuration Part 2.mp4
    33:27
  • 28 - ASA AAA Configuration Part 3.mp4
    29:35
  • 29 - Port Security.mp4
    33:58
  • 30 - DHCP Snooping Overview Part 1.mp4
    18:47
  • 31 - DHCP Snooping Overview Part 2.mp4
    20:51
  • 32 - DHCP Snooping Configuration.mp4
    18:41
  • 33 - Dynamic ARP Inspection Overview.mp4
    24:03
  • 34 - Dynamic ARP Inspection Configuration.mp4
    14:52
  • 35 - IP Spoofing Overview.mp4
    29:41
  • 36 - IP Spoofing Configuration.mp4
    29:59
  • 37 - STP Security Toolkit.mp4
    26:55
  • 38 - Storm Control.mp4
    29:25
  • 39 - Private VLAN Overview.mp4
    23:37
  • 40 - Private VLAN Configuration.mp4
    23:09
  • 41 - NAT Overview Part 1.mp4
    18:41
  • 42 - NAT Overview Part 2.mp4
    21:38
  • 43 - Static NAT Configuration.mp4
    28:14
  • 44- Dynamic NAT Configuration.mp4
    27:45
  • 45 - Policy NAT Configuration Part 1.mp4
    23:53
  • 46 - Policy NAT Configuration Part 2.mp4
    23:54
  • 47 - Zone Based Policy Firewall Overview.mp4
    30:21
  • 48 - Two Zone Firewall Configuration Part 1.mp4
    23:41
  • 49 - Two Zone Firewall Configuration Part 2.mp4
    24:40
  • 50 - Two Zone with NAT Firewall Configuration.mp4
    31:53
  • 51 - Three Zone Firewall Configuration Part 1.mp4
    19:44
  • 52 - Three Zone Firewall Configuration Part 2.mp4
    19:04
  • 53 - Zone Based Policy Firewall Tuning Overview.mp4
    24:09
  • 54- Zone Based Policy Firewall Tuning Configuration.mp4
    32:30
  • 55 - Zone Based Policy Firewall Application Inspection Part 1.mp4
    30:40
  • 56 - Zone Based Policy Firewall Application Inspection Part 2.mp4
    27:52
  • 57 - Zone Based Policy Firewall Self Zone Part 1.mp4
    21:27
  • 58 - Zone Based Policy Firewall Self Zone Part 2.mp4
    20:46
  • 59 - ASA Firewall Overview Part 1.mp4
    20:22
  • 60 - ASA Firewall Overview Part 2.mp4
    21:21
  • 61 - ASA Firewall ACL Overview Part 1.mp4
    21:35
  • 62 - ASA Firewall ACL Overview Part 2.mp4
    22:46
  • 63 - ASA Firewall ACL Configuration Part 1.mp4
    18:17
  • 64 - ASA Firewall ACL Configuration Part 2.mp4
    21:11
  • 65 - ASA Firewall Object Groups.mp4
    31:39
  • 66 - ASA Identity Firewall Overview Part 1.mp4
    15:05
  • 67 - ASA Identity Firewall Overview Part 2.mp4
    22:22
  • 68 - ASA Firewall Modular Policy Framework Overview Part 1.mp4
    20:00
  • 69 - ASA Firewall Modular Policy Framework Overview Part 2.mp4
    18:38
  • 70 - ASA Firewall MPF Advanced Inspections Part 1.mp4
    23:04
  • 71 - ASA Firewall MPF Advanced Inspections Part 2.mp4
    22:34
  • 72 - ASA Firewall MPF Dynamic Protocol Inspection Part 1.mp4
    21:02
  • 73 - ASA Firewall MPF Dynamic Protocol Inspection Part 2.mp4
    22:17
  • 74 - ASA Firewall MPF Application Inspection.mp4
    27:54
  • 75 - ASA Firewall NAT Overview.mp4
    23:53
  • 76 - ASA Firewall Object NAT Configuration.mp4
    30:05
  • 77 - ASA Firewall Twice NAT Configuration Part 1.mp4
    20:15
  • 78 - ASA Firewall Twice NAT Configuration Part 2.mp4
    18:33
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    INE: Expert IT Training for Networking, Cyber Security and Cloud INE is the trusted global leader in online IT training for networking, cyber security, cloud management, and data science.
    • language english
    • Training sessions 279
    • duration 89:21:14
    • Release Date 2023/08/18

    Courses related to CCNP Enterprise

    Courses related to Computer Network

    Courses related to IT Networking Fundamentals

    Courses related to Network Engineering

    Courses related to Network Monitoring

    Subtitle
    DevOps for Network Engineering
    INEDevOps for Network Engineering
    1:22:48
    English subtitles
    08/07/2023

    Courses related to Cisco CCNP