Cisco CCNP Security SCOR (Exam 350-701)
Focused View
16:49:30
3 View
1. Course Overview.mp4
07:28
2. Threats, Vulnerabilities, Exploits and Mitigations.mp4
12:45
3. Common Threats to On-Prem.mp4
22:23
4. Common Threats in the Cloud.mp4
15:58
5. Common Security Vulnerabilities.mp4
16:45
6. Some Attack Mitigations.mp4
19:03
7. Introduction to Cryptography.mp4
16:07
8. Modern Cryptographic Solutions.mp4
25:23
9. Fundamentals of PKI.mp4
22:10
10. Using the PKI.mp4
16:41
11. IKE v1 vs IKE v2.mp4
09:30
12. VPN Options.mp4
22:15
13. Security Intelligence Auth, Sharing, Consumption.mp4
11:34
14. Endpoint Protections Social Engineering Attacks.mp4
19:58
15. Types of Social Engineering Attacks.mp4
20:43
16. Northbound and Southbound APIs of SDN.mp4
17:33
17. Python Scripts for Security Appliance API Calls.mp4
21:56
18. Intrusion Prevention versus Firewalling.mp4
14:57
19. Deployment Models for Network Security.mp4
19:17
20. NetFlow and Flexible NetFlow.mp4
13:33
21. Network Segmentation.mp4
12:58
22. DHCP Snooping - Network Security.mp4
19:46
23. DAI and IP Source Guard.mp4
10:30
24. Private VLANs.mp4
26:07
25. Storm Control.mp4
14:45
26. Port Security and VLAN Hopping Attacks.mp4
22:52
27. Hardening the Network Infrastructure.mp4
14:53
28. Access Control Policies.mp4
19:43
29. Management Options for Security Solutions.mp4
11:01
30. Configure AAA for Device and Network Access.mp4
19:10
31. Configure Secure Network Management.mp4
17:48
32. Configure and Verify the Site-to-Site VPN.mp4
17:26
33. Configure and Verify the Remote Access VPN.mp4
22:21
34. Debugging and Showing IPsec Verifications.mp4
26:46
35. Cloud Deployment and Service Models.mp4
25:24
36. Security Responsibilities in the Cloud.mp4
11:08
37. Miscellaneous Cloud Security Topics.mp4
24:49
38. Introducing Cisco Firepower Devices.mp4
26:23
38. Traffic Redirection and Capture Methods.mp4
17:42
39. Web Proxy Identity and Authentication.mp4
18:48
40. Compare ESA, CES, WSA.mp4
15:56
41. The WSA and ESA Architectures.mp4
19:03
42. Configure and Verify the WSA.mp4
21:26
43. Configure and Verify the ESA.mp4
17:56
44. Describe the Cisco Umbrella Solution.mp4
10:00
45. Configure and Verify Cisco Umbrella.mp4
11:05
46. EPP versus EDR and Cisco AMP.mp4
10:22
47. Miscellaneous Endpoint Security.mp4
06:14
48. Outbreak Control.mp4
15:12
49. Describe MDM.mp4
12:11
50. Describe an MFA Strategy.mp4
17:29
51. Endpoint Posture Assessment Solutions.mp4
13:45
52. Explain an Endpoint Patching Strategy.mp4
19:25
53. Guest Services and BYOD.mp4
19:27
54. Configure and Verify 802.1X, MAB, and WebAuth.mp4
15:57
55. Network Access with CoA.mp4
08:03
56. Device Compliance and Application Control.mp4
17:06
57. Explain Exfiltration Techniques.mp4
10:51
58. Benefits of Network Telemetry.mp4
10:25
59. Describe Various Cisco Security Products.mp4
11:18
More details
User Reviews
Rating
average 0
Focused display

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 60
- duration 16:49:30
- Release Date 2024/04/26