Companies Home Search Profile

Complete Infoblox Tech Training (NIOS/BloxOne) P2/BloxOne

Focused View

GIANT Labs

5:21:55

55 View
  • 1.1 1- Introduction To BloxOne.pdf
  • 1. Introduction To BloxOne.mp4
    06:18
  • 2.1 2- Deploying BloxOne.pdf
  • 2. Deploying BloxOne.mp4
    11:35
  • 1.1 1- CSP Management.pdf
  • 1. CSP Management.mp4
    12:15
  • 2.1 2- Managing Role-Access Control.pdf
  • 2. Managing Role-Access Control.mp4
    08:30
  • 1.1 1- On-Prem Host Status.pdf
  • 1. On-Prem Host Status.mp4
    04:26
  • 2.1 2- On-Prem Host Configuring.pdf
  • 2. On-Prem Host Configuring.mp4
    04:31
  • 3.1 3- On-Prem Host General Activities.pdf
  • 3. On-Prem Host General Activities.mp4
    08:55
  • 4.1 4- On-Prem Host ( NIOS ) Grid Connector.pdf
  • 4. On-Prem Host ( NIOS ) Grid Connector.mp4
    02:10
  • 1.1 1- Global DHCP Options.pdf
  • 1. Global DHCP Options.mp4
    07:30
  • 2.1 2- Address Spaces.pdf
  • 2. Address Spaces.mp4
    03:48
  • 3.1 3- General DHCP Features.pdf
  • 3. General DHCP Features.mp4
    05:27
  • 4. BloxOne DDI - DHCP - Lab1.mp4
    30:44
  • 5. BloxOne DDI - DHCP - Lab2.mp4
    03:55
  • 6. BloxOne DDI - DHCP - Lab3.mp4
    05:34
  • 1.1 1- Global DNS Properties.pdf
  • 1. Global DNS Properties.mp4
    10:54
  • 2.1 2- DNS General Components.pdf
  • 2. DNS General Components.mp4
    06:19
  • 3.1 3- DNS Views & Zones.pdf
  • 3. DNS Views & Zones.mp4
    09:39
  • 4.1 4- Resource Records.pdf
  • 4. Resource Records.mp4
    03:06
  • 5. BloxOne DDI - DNS - Lab1.mp4
    29:03
  • 6. BloxOne DDI - DNS - Lab2.mp4
    19:03
  • 1.1 1- Introduction.pdf
  • 1. Introduction.mp4
    08:43
  • 2.1 2- Resolution Mechanisms.pdf
  • 2. Resolution Mechanisms.mp4
    09:01
  • 3.1 4- Configuring Security Policy.pdf
  • 3. Configuring Security Policy P1.mp4
    15:47
  • 4. Configuring Security Policy P2.mp4
    12:24
  • 5. Security Rules Activities.mp4
    13:36
  • 6. Policy And Policy Rules Actions.mp4
    15:47
  • 7.1 6- Bypass Codes.pdf
  • 7. Bypass Codes.mp4
    06:41
  • 8.1 7- Redirect Pages.pdf
  • 8. Redirect Pages.mp4
    04:28
  • 9.1 8- Endpoint Management.pdf
  • 9. Endpoint Management.mp4
    09:16
  • 10.1 10- Mobile Endpoint Management.pdf
  • 10. Mobile Endpoint Management ( IOS Android ).mp4
    03:00
  • 1.1 1- Threat Research.pdf
  • 1. Threat Research.mp4
    08:09
  • 2.1 2- Dossier & TIDE.pdf
  • 2. Dossier & TIDE.mp4
    08:52
  • 1.1 1- Logs.pdf
  • 1. Logs.mp4
    02:43
  • 2.1 2- Reports.pdf
  • 2. Reports.mp4
    09:46
  • Description


    A Complete Technical Guide To Most Popular Feature Of Infoblox BloxOne DDI & BloxOne Threat Defense

    What You'll Learn?


    • Defining the needed concepts of Infoblox BloxOne DDI and BloxOne Threat Defense
    • Using BloxOne To Create DNS Objects For On Premises Datacenters Using On Prem Hosts
    • Using BloxOne To Create DHCP Objects For In Premises Datacenters Using On Prem Hosts
    • Understands All Settings Related To On Prem Host And How To Configure It
    • Researching For Threats Using Research Tools Like Dossier
    • Using Logging And Reporting Options

    Who is this for?


  • - Systems Engineers .
  • - Networking Engineers .
  • - Networks/Systems Security Engineers .
  • - IT Professional
  • More details


    Description

    During This Second Portion Of "Complete Infoblox Technical Training (NIOS/BloxOne)" , we are going to explain and discover the main pillars of infoblox bloxone and how to use it inside our corporate network .

    Firstly , we are going to see how to use DDI within BloxOne and how to manage DNS and DHCP using an on prem host in our DC that can contact infoblox bloxone to start taking instruction from it to be executed inside our environment . We are going to review quickly on the theoretical stuff for DNS and DHCP before we get started with our labs and practice . Then there are some labs that we'll do related to DNS and DHCP through bloxone .

    Secondly , we are going to start with bloxone threat defense, which is a separate component used to secure the first gate of traffic "Resolving/DNS". We are going to see methods used to connect to your on prem host to start pushing the needed security policies to be used . Also we'll see the types of rules that we can use inside our security policies ( custom lists , app filters , feed and others ) and what are the available actions that we can take according to each rule .

    Finally , we are going to learn how to investigate for multiple objects ( passing traffic through DNS , DHCP , DNS activity and security alerts and also how to investigate a specific ip or domain using dossier and researching tools ) .



    Who this course is for:

    • - Systems Engineers .
    • - Networking Engineers .
    • - Networks/Systems Security Engineers .
    • - IT Professional

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    IT security professional with experience of designing and implementing security solutions in high-availability environments. Worked on a bunch of multiple vendor security solutions ( Fortigate , PaloAlto NGFW , Kaspersky Endpoint Solutions , Fortimail , F5 [LTM , ASM] , Pulse Secure , Cisco FTD ,  Cisco ISE , ... ) . Experience in troubleshooting , solving and recovering problems and crashings of security devices for different kinds of systems and networks .
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 34
    • duration 5:21:55
    • Release Date 2023/04/26

    Courses related to Network Security