Companies Home Search Profile

Cisco CCNP Security SCOR (Exam 350-701)

Focused View

16:49:30

3 View
  • 1. Course Overview.mp4
    07:28
  • 2. Threats, Vulnerabilities, Exploits and Mitigations.mp4
    12:45
  • 3. Common Threats to On-Prem.mp4
    22:23
  • 4. Common Threats in the Cloud.mp4
    15:58
  • 5. Common Security Vulnerabilities.mp4
    16:45
  • 6. Some Attack Mitigations.mp4
    19:03
  • 7. Introduction to Cryptography.mp4
    16:07
  • 8. Modern Cryptographic Solutions.mp4
    25:23
  • 9. Fundamentals of PKI.mp4
    22:10
  • 10. Using the PKI.mp4
    16:41
  • 11. IKE v1 vs IKE v2.mp4
    09:30
  • 12. VPN Options.mp4
    22:15
  • 13. Security Intelligence Auth, Sharing, Consumption.mp4
    11:34
  • 14. Endpoint Protections Social Engineering Attacks.mp4
    19:58
  • 15. Types of Social Engineering Attacks.mp4
    20:43
  • 16. Northbound and Southbound APIs of SDN.mp4
    17:33
  • 17. Python Scripts for Security Appliance API Calls.mp4
    21:56
  • 18. Intrusion Prevention versus Firewalling.mp4
    14:57
  • 19. Deployment Models for Network Security.mp4
    19:17
  • 20. NetFlow and Flexible NetFlow.mp4
    13:33
  • 21. Network Segmentation.mp4
    12:58
  • 22. DHCP Snooping - Network Security.mp4
    19:46
  • 23. DAI and IP Source Guard.mp4
    10:30
  • 24. Private VLANs.mp4
    26:07
  • 25. Storm Control.mp4
    14:45
  • 26. Port Security and VLAN Hopping Attacks.mp4
    22:52
  • 27. Hardening the Network Infrastructure.mp4
    14:53
  • 28. Access Control Policies.mp4
    19:43
  • 29. Management Options for Security Solutions.mp4
    11:01
  • 30. Configure AAA for Device and Network Access.mp4
    19:10
  • 31. Configure Secure Network Management.mp4
    17:48
  • 32. Configure and Verify the Site-to-Site VPN.mp4
    17:26
  • 33. Configure and Verify the Remote Access VPN.mp4
    22:21
  • 34. Debugging and Showing IPsec Verifications.mp4
    26:46
  • 35. Cloud Deployment and Service Models.mp4
    25:24
  • 36. Security Responsibilities in the Cloud.mp4
    11:08
  • 37. Miscellaneous Cloud Security Topics.mp4
    24:49
  • 38. Introducing Cisco Firepower Devices.mp4
    26:23
  • 38. Traffic Redirection and Capture Methods.mp4
    17:42
  • 39. Web Proxy Identity and Authentication.mp4
    18:48
  • 40. Compare ESA, CES, WSA.mp4
    15:56
  • 41. The WSA and ESA Architectures.mp4
    19:03
  • 42. Configure and Verify the WSA.mp4
    21:26
  • 43. Configure and Verify the ESA.mp4
    17:56
  • 44. Describe the Cisco Umbrella Solution.mp4
    10:00
  • 45. Configure and Verify Cisco Umbrella.mp4
    11:05
  • 46. EPP versus EDR and Cisco AMP.mp4
    10:22
  • 47. Miscellaneous Endpoint Security.mp4
    06:14
  • 48. Outbreak Control.mp4
    15:12
  • 49. Describe MDM.mp4
    12:11
  • 50. Describe an MFA Strategy.mp4
    17:29
  • 51. Endpoint Posture Assessment Solutions.mp4
    13:45
  • 52. Explain an Endpoint Patching Strategy.mp4
    19:25
  • 53. Guest Services and BYOD.mp4
    19:27
  • 54. Configure and Verify 802.1X, MAB, and WebAuth.mp4
    15:57
  • 55. Network Access with CoA.mp4
    08:03
  • 56. Device Compliance and Application Control.mp4
    17:06
  • 57. Explain Exfiltration Techniques.mp4
    10:51
  • 58. Benefits of Network Telemetry.mp4
    10:25
  • 59. Describe Various Cisco Security Products.mp4
    11:18
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 60
    • duration 16:49:30
    • Release Date 2024/04/26