Companies Home Search Profile

PCCET Certification Training

Focused View

Keith Barker

9:51:01

105 View
  • 1-Intro to Network Security Fundamentals.mp4
    00:45
  • 2-Types of Firewalls.mp4
    09:41
  • 3-IDS and IPS.mp4
    05:47
  • 4-VPNs.mp4
    08:38
  • 5-Data Loss Prevention.mp4
    05:01
  • 6-Unified Threat Management.mp4
    05:52
  • 7-Endpoint Security.mp4
    06:06
  • 8-Identity, Access, and Configuration Mgmt.mp4
    10:07
  • 1-Intro to Network Models.mp4
    00:47
  • 2-OSI Reference Model.mp4
    10:08
  • 3-TCP-IP Stack.mp4
    16:12
  • 4-Application Layer Services.mp4
    07:44
  • 5-Transport Layer Protocols.mp4
    06:00
  • 6-Network (L3) Layer Protocols.mp4
    03:52
  • 7-Layer 2 Data Link.mp4
    04:51
  • 8-Physical Layer (L1).mp4
    07:28
  • 9-Encapsulation and Decapsulation.mp4
    04:23
  • 1-Intro to IP Addressing.mp4
    00:36
  • 2-IPv4 and IPv6 Overview.mp4
    07:10
  • 3-Binary, Decimal, and Hex.mp4
    07:37
  • 4-IPv4.mp4
    09:06
  • 5-IPv6.mp4
    06:49
  • 6-DHCP.mp4
    07:28
  • 7-ARP.mp4
    05:19
  • 8-Subnetting Example.mp4
    05:43
  • 9-Subnetting Overview.mp4
    09:10
  • 1-Intro to Palo Alto Networking Fundamentals.mp4
    00:45
  • 2-Network Devices.mp4
    09:02
  • 3-Routed vs Routing Protocols.mp4
    13:51
  • 4-Routing Protocol Example.mp4
    09:49
  • 5-Network Types and Topologies.mp4
    12:54
  • 6-Domain Name System.mp4
    07:39
  • 7-Internet of Things IoT.mp4
    06:02
  • 1-Intro to Next-gen Firewall Features.mp4
    00:36
  • 2-Next-gen Firewall Overview.mp4
    11:45
  • 3-SSL Decryption.mp4
    07:36
  • 4-User Awareness.mp4
    09:13
  • 5-Application Awareness.mp4
    09:05
  • 6-URL Filtering.mp4
    06:35
  • 7-Threat Prevention.mp4
    07:05
  • 8-WildFire.mp4
    05:51
  • 1-Intro to the Cyberattack Lifecycle.mp4
    01:01
  • 2-Cyberattack Examples.mp4
    05:27
  • 3-Attacker Profile and Motivations.mp4
    03:50
  • 4-Overview of the Cyberattack Lifecycle.mp4
    14:40
  • 5-Advanced Persistent Threats.mp4
    03:12
  • 6-Preventing a Successful Attack.mp4
    16:16
  • 7-Preventing Port Scanning.mp4
    06:41
  • 1-Intro to Vulnerabilities, Exploits, and Risk.mp4
    00:30
  • 2-Overview of Vulnerabilities, Exploits, and Risk.mp4
    11:35
  • 3-Social Engineering.mp4
    07:28
  • 4-Circumventing Port-Based Firewalls.mp4
    12:47
  • 5-Types of Malware.mp4
    07:38
  • 6-Spamming and Phishing.mp4
    05:23
  • 7-DoS, DDoS, and Botnets.mp4
    09:04
  • 8-Wi-Fi Attacks.mp4
    09:28
  • 1-Intro to Cloud Computing and Security.mp4
    00:32
  • 2-Cloud Computing and Security Overview.mp4
    09:34
  • 3-SaaS Application Risks.mp4
    17:11
  • 4-Cybersecurity Laws and Regulations.mp4
    05:00
  • 5-User Identification.mp4
    10:28
  • 6-App Identification.mp4
    10:22
  • 1-Intro to Strategies for Securing Networks.mp4
    00:29
  • 2-Overview of Strategies for Securing Networks.mp4
    14:25
  • 3-Perimeter-based Network Security.mp4
    08:46
  • 4-Zero Trust and Least Privilege.mp4
    13:58
  • 5-Secure Platform Features.mp4
    10:17
  • 6-Palo Alto Networks Offerings.mp4
    15:04
  • 1-Intro to SecOps and DevSecOps.mp4
    00:40
  • 2-Dev, Ops, and Security Overview.mp4
    08:14
  • 3-SecOps Building Blocks.mp4
    09:30
  • 4-Cloud Security Challenges.mp4
    20:54
  • 5-VMs and Containers.mp4
    11:53
  • 6-Serverless Computing.mp4
    05:04
  • 7-Outsourcing Security.mp4
    13:32
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 75
    • duration 9:51:01
    • Release Date 2023/08/21