|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 001. CCNP and CCIE Security Core SCOR 350-701 Introduction.mp4 |
18.61Мб |
| 001. CCNP and CCIE Security Core SCOR 350-701 Introduction en.srt |
4.61Кб |
| 001. CCNP and CCIE Security Core SCOR 350-701 Summary.mp4 |
11.21Мб |
| 001. CCNP and CCIE Security Core SCOR 350-701 Summary en.srt |
2.28Кб |
| 001. Learning objectives.mp4 |
10.04Мб |
| 001. Learning objectives.mp4 |
4.26Мб |
| 001. Learning objectives.mp4 |
5.38Мб |
| 001. Learning objectives.mp4 |
6.70Мб |
| 001. Learning objectives.mp4 |
4.77Мб |
| 001. Learning objectives.mp4 |
7.88Мб |
| 001. Learning objectives.mp4 |
4.74Мб |
| 001. Learning objectives.mp4 |
6.22Мб |
| 001. Learning objectives.mp4 |
2.58Мб |
| 001. Learning objectives.mp4 |
3.76Мб |
| 001. Learning objectives.mp4 |
4.34Мб |
| 001. Learning objectives.mp4 |
6.61Мб |
| 001. Learning objectives.mp4 |
5.55Мб |
| 001. Learning objectives.mp4 |
6.87Мб |
| 001. Learning objectives en.srt |
2.02Кб |
| 001. Learning objectives en.srt |
886б |
| 001. Learning objectives en.srt |
970б |
| 001. Learning objectives en.srt |
1.22Кб |
| 001. Learning objectives en.srt |
1.34Кб |
| 001. Learning objectives en.srt |
2.23Кб |
| 001. Learning objectives en.srt |
1.31Кб |
| 001. Learning objectives en.srt |
1.76Кб |
| 001. Learning objectives en.srt |
787б |
| 001. Learning objectives en.srt |
729б |
| 001. Learning objectives en.srt |
904б |
| 001. Learning objectives en.srt |
1.28Кб |
| 001. Learning objectives en.srt |
1.68Кб |
| 001. Learning objectives en.srt |
2.03Кб |
| 001. Module introduction.mp4 |
1.83Мб |
| 001. Module introduction.mp4 |
2.05Мб |
| 001. Module introduction.mp4 |
2.27Мб |
| 001. Module introduction.mp4 |
2.46Мб |
| 001. Module introduction.mp4 |
1.68Мб |
| 001. Module introduction.mp4 |
2.50Мб |
| 001. Module introduction.mp4 |
1.46Мб |
| 001. Module introduction en.srt |
502б |
| 001. Module introduction en.srt |
526б |
| 001. Module introduction en.srt |
629б |
| 001. Module introduction en.srt |
673б |
| 001. Module introduction en.srt |
411б |
| 001. Module introduction en.srt |
772б |
| 001. Module introduction en.srt |
354б |
| 002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 |
41.96Мб |
| 002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits en.srt |
21.68Кб |
| 002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 |
18.11Мб |
| 002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs en.srt |
11.02Кб |
| 002. 11.1 Introducing Remote Access VPNs.mp4 |
3.70Мб |
| 002. 11.1 Introducing Remote Access VPNs en.srt |
1.97Кб |
| 002. 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 |
11.39Мб |
| 002. 12.1 Introducing the Different Cloud Deployment and Service Models en.srt |
5.61Кб |
| 002. 13.1 Introducing Cisco Content Security Solutions.mp4 |
10.14Мб |
| 002. 13.1 Introducing Cisco Content Security Solutions en.srt |
4.23Кб |
| 002. 14.1 Introducing AMP for Endpoints.mp4 |
7.53Мб |
| 002. 14.1 Introducing AMP for Endpoints en.srt |
3.73Кб |
| 002. 2.1 Introducing Cryptography and Cryptanalysis.mp4 |
5.43Мб |
| 002. 2.1 Introducing Cryptography and Cryptanalysis en.srt |
2.56Кб |
| 002. 3.1 Introducing SDN.mp4 |
13.80Мб |
| 002. 3.1 Introducing SDN en.srt |
6.90Кб |
| 002. 4.1 Introducing Network Programmability.mp4 |
31.25Мб |
| 002. 4.1 Introducing Network Programmability en.srt |
13.35Кб |
| 002. 5.1 Understanding Authentication.mp4 |
30.03Мб |
| 002. 5.1 Understanding Authentication en.srt |
17.51Кб |
| 002. 6.1 Defining Network Visibility and Segmentation.mp4 |
6.19Мб |
| 002. 6.1 Defining Network Visibility and Segmentation en.srt |
3.25Кб |
| 002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 |
12.92Мб |
| 002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt |
7.10Кб |
| 002. 8.1 Introducing Cisco Next-Generation Firewalls.mp4 |
17.87Мб |
| 002. 8.1 Introducing Cisco Next-Generation Firewalls en.srt |
10.40Кб |
| 002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 |
28.68Мб |
| 002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems en.srt |
7.90Кб |
| 003. 1.2 Keyloggers and Spyware.mp4 |
7.39Мб |
| 003. 1.2 Keyloggers and Spyware en.srt |
4.41Кб |
| 003. 10.2 Configuring IPsec Site-to-site VPNs.mp4 |
5.59Мб |
| 003. 10.2 Configuring IPsec Site-to-site VPNs en.srt |
3.78Кб |
| 003. 11.2 Exploring Clientless Remote Access VPNs.mp4 |
12.47Мб |
| 003. 11.2 Exploring Clientless Remote Access VPNs en.srt |
6.90Кб |
| 003. 12.2 Surveying Patch Management in the Cloud.mp4 |
8.26Мб |
| 003. 12.2 Surveying Patch Management in the Cloud en.srt |
4.88Кб |
| 003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 |
8.25Мб |
| 003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification en.srt |
3.83Кб |
| 003. 14.2 Describing AMP for Endpoints Outbreak Control.mp4 |
16.13Мб |
| 003. 14.2 Describing AMP for Endpoints Outbreak Control en.srt |
8.64Кб |
| 003. 2.2 Understanding Encryption Protocols.mp4 |
13.56Мб |
| 003. 2.2 Understanding Encryption Protocols en.srt |
7.63Кб |
| 003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 |
9.64Мб |
| 003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt |
3.64Кб |
| 003. 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 |
3.80Мб |
| 003. 4.2 Exploring DevNet and DevNet Resources for Security Automation en.srt |
1.61Кб |
| 003. 5.2 Exploring the RADIUS Protocol.mp4 |
10.29Мб |
| 003. 5.2 Exploring the RADIUS Protocol en.srt |
5.15Кб |
| 003. 6.2 Introducing NetFlow and IPFIX.mp4 |
6.60Мб |
| 003. 6.2 Introducing NetFlow and IPFIX en.srt |
3.43Кб |
| 003. 7.2 Configuring and Verifying Port Security.mp4 |
11.89Мб |
| 003. 7.2 Configuring and Verifying Port Security en.srt |
5.18Кб |
| 003. 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 |
44.31Мб |
| 003. 8.2 Surveying the Cisco Firepower Management Center (FMC) en.srt |
18.10Кб |
| 003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven.mp4 |
8.32Мб |
| 003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven en.srt |
2.37Кб |
| 004. 1.3 Malware Analysis Techniques.mp4 |
11.47Мб |
| 004. 1.3 Malware Analysis Techniques en.srt |
5.41Кб |
| 004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 |
9.94Мб |
| 004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers en.srt |
5.23Кб |
| 004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 |
9.34Мб |
| 004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client en.srt |
4.26Кб |
| 004. 12.3 Performing Security Assessments in Cloud Environments.mp4 |
11.58Мб |
| 004. 12.3 Performing Security Assessments in Cloud Environments en.srt |
4.63Кб |
| 004. 13.3 Introduction to Cisco Email Security.mp4 |
13.00Мб |
| 004. 13.3 Introduction to Cisco Email Security en.srt |
4.31Кб |
| 004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 |
7.29Мб |
| 004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions en.srt |
3.24Кб |
| 004. 2.3 Describing Hashing Algorithms.mp4 |
11.30Мб |
| 004. 2.3 Describing Hashing Algorithms en.srt |
5.78Кб |
| 004. 3.3 Introducing Cisco ACI.mp4 |
17.68Мб |
| 004. 3.3 Introducing Cisco ACI en.srt |
9.86Кб |
| 004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 |
37.47Мб |
| 004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt |
16.87Кб |
| 004. 5.3 Surveying the TACACS+ Protocol.mp4 |
7.09Мб |
| 004. 5.3 Surveying the TACACS+ Protocol en.srt |
3.32Кб |
| 004. 6.3 Describing Flexible NetFlow Records.mp4 |
11.19Мб |
| 004. 6.3 Describing Flexible NetFlow Records en.srt |
5.55Кб |
| 004. 7.3 Configuring and Verifying DHCP Snooping.mp4 |
11.32Мб |
| 004. 7.3 Configuring and Verifying DHCP Snooping en.srt |
3.94Кб |
| 004. 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 |
23.97Мб |
| 004. 8.3 Exploring the Cisco Firepower Device Manager (FDM) en.srt |
11.08Кб |
| 004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 |
11.89Мб |
| 004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems en.srt |
6.48Кб |
| 005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.mp4 |
12.06Мб |
| 005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.srt |
5.04Кб |
| 005. 10.4 Exploring DMVPN.mp4 |
19.60Мб |
| 005. 10.4 Exploring DMVPN en.srt |
10.97Кб |
| 005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 |
11.97Мб |
| 005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD en.srt |
5.11Кб |
| 005. 12.4 Introducing Agile, DevOps, and CICD Pipelines.mp4 |
22.05Мб |
| 005. 12.4 Introducing Agile, DevOps, and CICD Pipelines en.srt |
12.62Кб |
| 005. 13.4 Exploring the Cisco ESA Deployment Model.mp4 |
5.19Мб |
| 005. 13.4 Exploring the Cisco ESA Deployment Model en.srt |
2.79Кб |
| 005. 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 |
7.09Мб |
| 005. 14.4 Understanding AMP IP Blacklists and Whitelists en.srt |
3.73Кб |
| 005. 2.4 Introducing Public Key Infrastructure (PKI).mp4 |
16.74Мб |
| 005. 2.4 Introducing Public Key Infrastructure (PKI) en.srt |
7.92Кб |
| 005. 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 |
28.97Мб |
| 005. 3.4 Introducing Cisco DNA and Cisco DNA Center en.srt |
10.64Кб |
| 005. 4.4 A Brief Introduction to Git.mp4 |
25.27Мб |
| 005. 4.4 A Brief Introduction to Git en.srt |
10.13Кб |
| 005. 5.4 Understanding Authorization.mp4 |
7.36Мб |
| 005. 5.4 Understanding Authorization en.srt |
3.38Кб |
| 005. 6.4 Understanding NetFlow Deployment.mp4 |
10.54Мб |
| 005. 6.4 Understanding NetFlow Deployment en.srt |
3.95Кб |
| 005. 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 |
15.58Мб |
| 005. 7.4 Configuring and Verifying Dynamic ARP Inspection en.srt |
7.23Кб |
| 005. 8.4 Implementing Access Control Policies.mp4 |
7.79Мб |
| 005. 8.4 Implementing Access Control Policies en.srt |
5.55Кб |
| 006. 1.5 Surveying Common Application-based Vulnerabilities.mp4 |
32.64Мб |
| 006. 1.5 Surveying Common Application-based Vulnerabilities en.srt |
8.64Кб |
| 006. 10.5 Understanding GET VPN.mp4 |
15.68Мб |
| 006. 10.5 Understanding GET VPN en.srt |
8.36Кб |
| 006. 11.5 Troubleshooting Remote Access VPN Implementations.mp4 |
4.68Мб |
| 006. 11.5 Troubleshooting Remote Access VPN Implementations en.srt |
2.32Кб |
| 006. 12.5 Introducing Serverless Computing.mp4 |
3.68Мб |
| 006. 12.5 Introducing Serverless Computing en.srt |
1.86Кб |
| 006. 13.5 Understanding Email Security Features.mp4 |
9.48Мб |
| 006. 13.5 Understanding Email Security Features en.srt |
4.66Кб |
| 006. 14.5 Exploring Application Control in AMP for Endpoints.mp4 |
3.94Мб |
| 006. 14.5 Exploring Application Control in AMP for Endpoints en.srt |
1.78Кб |
| 006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 |
14.99Мб |
| 006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment en.srt |
6.61Кб |
| 006. 3.5 Understanding VXLAN and Network Overlays.mp4 |
9.92Мб |
| 006. 3.5 Understanding VXLAN and Network Overlays en.srt |
4.52Кб |
| 006. 4.5 Exploring pxGrid.mp4 |
15.73Мб |
| 006. 4.5 Exploring pxGrid en.srt |
7.29Кб |
| 006. 5.5 Surveying Authorization Models.mp4 |
14.79Мб |
| 006. 5.5 Surveying Authorization Models en.srt |
6.49Кб |
| 006. 6.5 Exploring Cisco Stealthwatch.mp4 |
5.04Мб |
| 006. 6.5 Exploring Cisco Stealthwatch en.srt |
2.82Кб |
| 006. 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 |
15.54Мб |
| 006. 7.5 Exploring and Mitigating Common Layer 2 Threats en.srt |
6.25Кб |
| 007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.mp4 |
26.00Мб |
| 007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.srt |
11.49Кб |
| 007. 10.6 Deploying FlexVPN.mp4 |
19.52Мб |
| 007. 10.6 Deploying FlexVPN en.srt |
9.59Кб |
| 007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 |
5.61Мб |
| 007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes en.srt |
2.42Кб |
| 007. 13.6 Discussing Email Security in the Cloud.mp4 |
9.18Мб |
| 007. 13.6 Discussing Email Security in the Cloud en.srt |
4.68Кб |
| 007. 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 |
11.41Мб |
| 007. 14.6 Describing AMP for Endpoints Exclusion Sets en.srt |
5.94Кб |
| 007. 2.6 Surveying SSL and TLS Implementations.mp4 |
13.73Мб |
| 007. 2.6 Surveying SSL and TLS Implementations en.srt |
6.35Кб |
| 007. 3.6 Understanding Microsegmentation.mp4 |
9.23Мб |
| 007. 3.6 Understanding Microsegmentation en.srt |
6.11Кб |
| 007. 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 |
11.29Мб |
| 007. 4.6 Integrating and Automating Security Operations with Cisco Products en.srt |
5.05Кб |
| 007. 5.6 Defining Accounting.mp4 |
5.96Мб |
| 007. 5.6 Defining Accounting en.srt |
2.66Кб |
| 007. 6.6 Deploying Cisco Stealthwatch Cloud.mp4 |
8.61Мб |
| 007. 6.6 Deploying Cisco Stealthwatch Cloud en.srt |
4.36Кб |
| 007. 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 |
6.70Мб |
| 007. 7.6 Understanding and Configuring BPDU Guard and Root Guard en.srt |
3.19Кб |
| 008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 |
59.27Мб |
| 008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities en.srt |
28.85Кб |
| 008. 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 |
13.43Мб |
| 008. 10.7 Troubleshooting Site-to-site VPN Implementations en.srt |
7.88Кб |
| 008. 12.7 Exploring the Concepts of DevSecOps.mp4 |
12.64Мб |
| 008. 12.7 Exploring the Concepts of DevSecOps en.srt |
6.26Кб |
| 008. 13.7 Introduction to Secure Internet Gateway (SIG).mp4 |
6.65Мб |
| 008. 13.7 Introduction to Secure Internet Gateway (SIG) en.srt |
3.50Кб |
| 008. 14.7 Introduction to AMP for Endpoints Policies.mp4 |
1.95Мб |
| 008. 14.7 Introduction to AMP for Endpoints Policies en.srt |
1.17Кб |
| 008. 2.7 Surveying IPsec Implementations.mp4 |
41.70Мб |
| 008. 2.7 Surveying IPsec Implementations en.srt |
20.66Кб |
| 008. 3.7 Surveying Open Source SDN Solutions.mp4 |
10.03Мб |
| 008. 3.7 Surveying Open Source SDN Solutions en.srt |
5.10Кб |
| 008. 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 |
24.59Мб |
| 008. 5.7 Exploring Multifactor Authentication and Single Sign-On en.srt |
8.91Кб |
| 008. 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 |
2.57Мб |
| 008. 6.7 On-Premise Monitoring with Stealthwatch Cloud en.srt |
1.18Кб |
| 008. 7.7 Understanding and Configuring CDPLLDP.mp4 |
8.96Мб |
| 008. 7.7 Understanding and Configuring CDPLLDP en.srt |
3.46Кб |
| 009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 |
70.87Мб |
| 009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities en.srt |
30.30Кб |
| 009. 12.8 Surveying Cisco Umbrella.mp4 |
15.75Мб |
| 009. 12.8 Surveying Cisco Umbrella en.srt |
7.83Кб |
| 009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 |
10.13Мб |
| 009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella en.srt |
3.55Кб |
| 009. 14.8 Describing the Anyconnect AMP Enabler.mp4 |
1.14Мб |
| 009. 14.8 Describing the Anyconnect AMP Enabler en.srt |
633б |
| 009. 3.8 Understanding the Threats Against SDN Solutions.mp4 |
7.36Мб |
| 009. 3.8 Understanding the Threats Against SDN Solutions en.srt |
3.49Кб |
| 009. 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 |
6.79Мб |
| 009. 5.8 Exploring Examples of Multifactor and Single Sign-On en.srt |
2.38Кб |
| 009. 6.8 Exploring the Cisco TrustSec Solution.mp4 |
9.99Мб |
| 009. 6.8 Exploring the Cisco TrustSec Solution en.srt |
4.47Кб |
| 009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 |
15.08Мб |
| 009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt |
8.33Кб |
| 010. 1.9 Understanding Buffer Overflows.mp4 |
20.08Мб |
| 010. 1.9 Understanding Buffer Overflows en.srt |
8.70Кб |
| 010. 12.9 Exploring Cisco Cloud Email Security.mp4 |
5.21Мб |
| 010. 12.9 Exploring Cisco Cloud Email Security en.srt |
3.23Кб |
| 010. 13.9 Exploring Cisco Umbrella Investigate.mp4 |
10.65Мб |
| 010. 13.9 Exploring Cisco Umbrella Investigate en.srt |
4.75Кб |
| 010. 14.9 Exploring AMP for Endpoints Engines.mp4 |
3.30Мб |
| 010. 14.9 Exploring AMP for Endpoints Engines en.srt |
1.99Кб |
| 010. 3.9 Understanding the Security Benefits in SDN Solutions.mp4 |
6.73Мб |
| 010. 3.9 Understanding the Security Benefits in SDN Solutions en.srt |
2.82Кб |
| 010. 5.9 Understanding Cisco DUO.mp4 |
11.93Мб |
| 010. 5.9 Understanding Cisco DUO en.srt |
6.53Кб |
| 010. 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 |
5.57Мб |
| 010. 6.9 Describing the Benefits of Device Compliance and Application Control en.srt |
2.94Кб |
| 010. 7.9 Exploring How to Secure the Management Plane.mp4 |
14.22Мб |
| 010. 7.9 Exploring How to Secure the Management Plane en.srt |
7.23Кб |
| 011. 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 |
11.40Мб |
| 011. 1.10 Surveying Unsecure Code Practices and Insecure APIs en.srt |
5.81Кб |
| 011. 12.10 Exploring Cisco Cloudlock.mp4 |
13.50Мб |
| 011. 12.10 Exploring Cisco Cloudlock en.srt |
6.91Кб |
| 011. 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 |
9.06Мб |
| 011. 14.10 How to Utilize AMP for Endpoints Reporting Features en.srt |
5.04Кб |
| 011. 5.10 Introducing Cisco ISE.mp4 |
11.29Мб |
| 011. 5.10 Introducing Cisco ISE en.srt |
4.75Кб |
| 011. 6.10 Introducing Network Segmentation.mp4 |
5.31Мб |
| 011. 6.10 Introducing Network Segmentation en.srt |
2.85Кб |
| 011. 7.10 Exploring How to Secure the Control Plane.mp4 |
15.02Мб |
| 011. 7.10 Exploring How to Secure the Control Plane en.srt |
8.10Кб |
| 012. 1.11 Understanding Security Threats in Cloud Environments.mp4 |
21.57Мб |
| 012. 1.11 Understanding Security Threats in Cloud Environments en.srt |
11.76Кб |
| 012. 14.11 Introducing the Cisco Threat Response Solution.mp4 |
11.14Мб |
| 012. 14.11 Introducing the Cisco Threat Response Solution en.srt |
3.42Кб |
| 012. 5.11 Understanding Cisco ISE Profiling Services.mp4 |
7.52Мб |
| 012. 5.11 Understanding Cisco ISE Profiling Services en.srt |
4.35Кб |
| 012. 6.11 Exploring Application-based Segmentation.mp4 |
5.82Мб |
| 012. 6.11 Exploring Application-based Segmentation en.srt |
2.97Кб |
| 012. 7.11 Exploring How to Secure the Data Plane.mp4 |
11.74Мб |
| 012. 7.11 Exploring How to Secure the Data Plane en.srt |
6.09Кб |
| 013. 1.12 Understanding IoT Security Threats.mp4 |
37.32Мб |
| 013. 1.12 Understanding IoT Security Threats en.srt |
14.19Кб |
| 013. 5.12 Understanding ISE Identity Services.mp4 |
11.73Мб |
| 013. 5.12 Understanding ISE Identity Services en.srt |
5.90Кб |
| 013. 6.12 Understanding Cisco ACI.mp4 |
7.64Мб |
| 013. 6.12 Understanding Cisco ACI en.srt |
3.63Кб |
| 014. 5.13 Describing ISE Authorization Rules.mp4 |
8.39Мб |
| 014. 5.13 Describing ISE Authorization Rules en.srt |
3.62Кб |
| 014. 6.13 Describing Network Access with CoA.mp4 |
4.96Мб |
| 014. 6.13 Describing Network Access with CoA en.srt |
2.36Кб |
| 015. 6.14 Integrating Different Security Systems Using pxGrid.mp4 |
9.92Мб |
| 015. 6.14 Integrating Different Security Systems Using pxGrid en.srt |
4.22Кб |
| 016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr.mp4 |
18.02Мб |
| 016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr en.srt |
9.39Кб |