Companies Home Search Profile

Security 3.0

Focused View

21:27:14

229 View
  • 1.1.1 Network Security Devices and Networking.mp4
    11:57
  • 1.1.2 Introduction to Firewalls, SVN, NIP, AntiDDoS and FireHunter.mp4
    20:57
  • 1.1.3 Introduction to WAF, Agile Controller, AnyOffice, eSight, LogCenter and UMA.mp4
    09:14
  • 1.1.4.1.1.4 Introduction to Network Security Networking.mp4
    14:02
  • 1.2.1 Network Security O&M.mp4
    05:59
  • 1.2.2 File System.mp4
    06:06
  • 1.2.3 Administrator Permission Control and Protocols.mp4
    11:37
  • 1.2.4 Analysis of Network Security Device Logs.mp4
    12:02
  • 1.2.5 Log Event Management Center.mp4
    12:06
  • 1.3.1 Application Scenario of Intelligent Uplink Selection.mp4
    08:21
  • 1.3.2 Principle of Intelligent Uplink Selection.mp4
    10:49
  • 1.3.3 Application Analysis of Intelligent Uplink Selection.mp4
    12:33
  • 1.3.4 Troubleshooting of Intelligent Uplink Selection.mp4
    08:47
  • 1.4.1 SLB Overview and Implementation Mechanism.mp4
    19:00
  • 1.4.2 SLB Configuration and Deployment.mp4
    09:44
  • 1.5.1 Introduction to IP-Link.mp4
    11:33
  • 1.5.2 Introduction to BFD.mp4
    11:30
  • 1.5.3 Introduction to Hot Standby.mp4
    11:35
  • 1.5.4 Application Scenario to Hot Standby.mp4
    12:56
  • 1.5.5 Introduction to Link-Group and Eth-Trunk.mp4
    07:01
  • 1.6.1 IPSec VPN Scenario Overview.mp4
    17:56
  • 1.6.2 Principle of IPSec VPN.mp4
    16:35
  • 1.6.3 Principle of IKEv1 and IKEv2 .mp4
    15:26
  • 1.6.4 IPSec VPN Application Scenario .mp4
    10:28
  • 1.6.5 Hub-Spoke IPSec VPN Application Scenario.mp4
    11:46
  • 1.6.6 GRE over IPSec VPN.mp4
    14:47
  • 1.7.1 SSL VPN Technology and Application.mp4
    09:42
  • 1.7.2 Application of Certificates in SSL VPN 1.7 SSL VPN Technology and Application.mp4
    11:10
  • 1.7.3 SSL VPN Application Scenario Analysis 1.7 SSL VPN Technology and Application.mp4
    05:56
  • 1.7.4 SSL VPN Troubleshooting 1.7 SSL VPN Technology and Application.mp4
    15:35
  • 1.8.1 Bandwidth Management Overview.mp4
    07:36
  • 1.8.2 Bandwidth Management Principle.mp4
    11:33
  • 1.8.3 Bandwidth Management Configuration and Deployment.mp4
    10:04
  • 1.8.4 Bandwidth Management Troubleshooting.mp4
    10:26
  • 1.9.1 Virtual System Overview.mp4
    07:32
  • 1.9.2 Virtual System Principle.mp4
    18:13
  • 1.9.3 Virtual System Configuration.mp4
    06:04
  • 1.9.4 Virtual System Deployment.mp4
    06:05
  • 1.9.5 Virtual System Troubleshooting.mp4
    04:52
  • HCIP-Security CISN V3.0 Training Material.pdf
  • HCIP-Security-CISN Lab Guide.pdf
  • 2.1.1 Basic information Security Knowledge.mp4
    23:12
  • 2.1.2 Content Security Threat -1.mp4
    13:01
  • 2.1.3 Content Security Threat -2.mp4
    13:19
  • 2.1.4 Content Security Technology - 1.mp4
    21:17
  • 2.1.5 Content Security Technology - 2.mp4
    10:50
  • 2.1.6 IAE Detection Engine.mp4
    20:31
  • 2.2.1 Overview of Content Security Filter Technologies.mp4
    07:58
  • 2.2.2 File Blocking and Data Filtering Technology.mp4
    18:34
  • 2.2.3 Mail Filter and Application Behavior Control Technology.mp4
    13:44
  • 2.2.4 Configuration of Content Security Filtering Technologies.mp4
    08:49
  • 2.2.5 Troubleshooting of Content Security Filtering Technologies.mp4
    10:06
  • 2.3.1 Web Security Defense Overview.mp4
    12:32
  • 2.3.2 Web Attack Analysis.mp4
    14:30
  • 2.3.3 URL Filtering Technology.mp4
    16:55
  • 2.3.4 Web Application System Protection Technology.mp4
    18:07
  • 2.4.1 Introduction to Network Intrusion.mp4
    13:24
  • 2.4.2 IDS and IPS System.mp4
    14:45
  • 2.5.1 Application Scenario of Intrusion Prevention Devices.mp4
    10:35
  • 2.5.2 Application and Configuration of Intrusion Prevention Devices - 1.mp4
    18:01
  • 2.5.3 Application and Configuration of Intrusion Prevention Devices - 2.mp4
    19:08
  • 2.5.4 Features of Firewall Intrusion Prevention.mp4
    07:48
  • 2.6.1 Computer Virus Overview - 1.mp4
    07:37
  • 2.6.2 Computer Virus Overview - 2.mp4
    09:18
  • 2.6.3 Antivirus Technologies.mp4
    07:30
  • 2.6.4 Gateway Antivirus Configuration.mp4
    06:30
  • 2.7.1 Introduction to Network Attacks.mp4
    09:49
  • 2.7.2 Principle of Single-Packet Attack Defense - 1.mp4
    13:28
  • 2.7.3 Principle of Single-Packet Attack Defense - 2.mp4
    07:08
  • 2.7.4 Principle of Traffic Attack Defense - 1.mp4
    14:39
  • 2.7.5 Principle of Traffic Attack Defense - 2.mp4
    12:33
  • 2.7.6 Principle of Traffic Attack Defense - 3.mp4
    11:24
  • 2.7.7 Solutions to Traffic Attacks.mp4
    11:40
  • 2.7.8 Features of Firewall Attack Defense.mp4
    08:36
  • 2.8.1 Security in the Cloud Era.mp4
    06:26
  • 2.8.2 Big Data-based Proactive Defense - 1.mp4
    14:50
  • 2.8.3 Big Data-based Proactive Defense - 2.mp4
    08:40
  • 2.8.4 Software-Defined Security.mp4
    15:12
  • HCIP-Security CSSN V3.0 Training Material.pdf
  • HCIP-Security-CSSN V3.0 Lab Guide.pdf
  • 3.1.1 Necessity of Terminal Security.mp4
    15:21
  • 3.1.2 Design Roadmap of the Terminal Security Solution.mp4
    16:16
  • 3.2.1 WLAN Overview.mp4
    14:37
  • 3.2.2 WLAN Security Overview.mp4
    18:27
  • 3.2.3 WLAN Security Threats.mp4
    11:40
  • 3.2.4 WLAN Security Techology - 1.mp4
    20:35
  • 3.2.5 WLAN Security Techology - 2.mp4
    20:26
  • 3.2.6 Typical WLAN Security Design Cause.mp4
    17:36
  • 3.3.1 Agile Controller-Campus Overview.mp4
    16:20
  • 3.3.2 Install Agile Controller-Campus.mp4
    11:17
  • 3.3.3 Start the Agile Controller-Campus for the First Time.mp4
    09:02
  • 3.4.1 User Management Overview.mp4
    13:18
  • 3.4.2 User Management Function.mp4
    09:15
  • 3.5.1 Access Control Overview.mp4
    13:44
  • 3.5.2 Wired 802.1X Authentication.mp4
    11:25
  • 3.5.3 Wireless 802.1X Authentication.mp4
    09:23
  • 3.5.4 Wired MAC Address Authentication.mp4
    06:46
  • 3.5.5 Wireless MAC Address Authentication.mp4
    06:49
  • 3.6.1 SACG Authentication Principles.mp4
    08:25
  • 3.6.2 SACG Authentication Configuration and Deployment.mp4
    15:32
  • 3.6.3 SACG Authentication Troubleshooting.mp4
    08:01
  • 3.7.1 Portal Authentication Principles.mp4
    08:10
  • 3.7.2 Wired Portal Authentication Configuration and Deployment.mp4
    07:01
  • 3.7.3 Wireless Portal Authentication Configuration and Deployment.mp4
    20:04
  • 3.8.1 Principles of the Agile Network Solution.mp4
    11:14
  • 3.8.2 Configurations of Agile Features.mp4
    17:04
  • 3.9.1 eSight Functions.mp4
    11:23
  • 3.9.2 Network Management Protocols and Features.mp4
    09:17
  • 3.9.3 Network Resource Management.mp4
    05:09
  • 3.9.4 Secure Center Management.mp4
    05:52
  • 3.9.5 IPSec VPN Management.mp4
    05:44
  • HCIP-Security CTSS V3.0 Training Material.pdf
  • HCIP-Security-CTSS V3.0 Lab Guide.pdf
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Digital learning portal for Carriers, providing online learning services such as online courses, online classes, online practice and online exams.
    • language english
    • Training sessions 107
    • duration 21:27:14
    • Release Date 2023/05/03