Общая информация
Название CCNP and CCIE Security Core SCOR 350-701
Тип
Размер 1.76Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
001. CCNP and CCIE Security Core SCOR 350-701 Introduction.mp4 18.61Мб
001. CCNP and CCIE Security Core SCOR 350-701 Introduction en.srt 4.61Кб
001. CCNP and CCIE Security Core SCOR 350-701 Summary.mp4 11.21Мб
001. CCNP and CCIE Security Core SCOR 350-701 Summary en.srt 2.28Кб
001. Learning objectives.mp4 10.04Мб
001. Learning objectives.mp4 4.26Мб
001. Learning objectives.mp4 5.38Мб
001. Learning objectives.mp4 6.70Мб
001. Learning objectives.mp4 4.77Мб
001. Learning objectives.mp4 7.88Мб
001. Learning objectives.mp4 4.74Мб
001. Learning objectives.mp4 6.22Мб
001. Learning objectives.mp4 2.58Мб
001. Learning objectives.mp4 3.76Мб
001. Learning objectives.mp4 4.34Мб
001. Learning objectives.mp4 6.61Мб
001. Learning objectives.mp4 5.55Мб
001. Learning objectives.mp4 6.87Мб
001. Learning objectives en.srt 2.02Кб
001. Learning objectives en.srt 886б
001. Learning objectives en.srt 970б
001. Learning objectives en.srt 1.22Кб
001. Learning objectives en.srt 1.34Кб
001. Learning objectives en.srt 2.23Кб
001. Learning objectives en.srt 1.31Кб
001. Learning objectives en.srt 1.76Кб
001. Learning objectives en.srt 787б
001. Learning objectives en.srt 729б
001. Learning objectives en.srt 904б
001. Learning objectives en.srt 1.28Кб
001. Learning objectives en.srt 1.68Кб
001. Learning objectives en.srt 2.03Кб
001. Module introduction.mp4 1.83Мб
001. Module introduction.mp4 2.05Мб
001. Module introduction.mp4 2.27Мб
001. Module introduction.mp4 2.46Мб
001. Module introduction.mp4 1.68Мб
001. Module introduction.mp4 2.50Мб
001. Module introduction.mp4 1.46Мб
001. Module introduction en.srt 502б
001. Module introduction en.srt 526б
001. Module introduction en.srt 629б
001. Module introduction en.srt 673б
001. Module introduction en.srt 411б
001. Module introduction en.srt 772б
001. Module introduction en.srt 354б
002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 41.96Мб
002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits en.srt 21.68Кб
002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 18.11Мб
002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs en.srt 11.02Кб
002. 11.1 Introducing Remote Access VPNs.mp4 3.70Мб
002. 11.1 Introducing Remote Access VPNs en.srt 1.97Кб
002. 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 11.39Мб
002. 12.1 Introducing the Different Cloud Deployment and Service Models en.srt 5.61Кб
002. 13.1 Introducing Cisco Content Security Solutions.mp4 10.14Мб
002. 13.1 Introducing Cisco Content Security Solutions en.srt 4.23Кб
002. 14.1 Introducing AMP for Endpoints.mp4 7.53Мб
002. 14.1 Introducing AMP for Endpoints en.srt 3.73Кб
002. 2.1 Introducing Cryptography and Cryptanalysis.mp4 5.43Мб
002. 2.1 Introducing Cryptography and Cryptanalysis en.srt 2.56Кб
002. 3.1 Introducing SDN.mp4 13.80Мб
002. 3.1 Introducing SDN en.srt 6.90Кб
002. 4.1 Introducing Network Programmability.mp4 31.25Мб
002. 4.1 Introducing Network Programmability en.srt 13.35Кб
002. 5.1 Understanding Authentication.mp4 30.03Мб
002. 5.1 Understanding Authentication en.srt 17.51Кб
002. 6.1 Defining Network Visibility and Segmentation.mp4 6.19Мб
002. 6.1 Defining Network Visibility and Segmentation en.srt 3.25Кб
002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 12.92Мб
002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt 7.10Кб
002. 8.1 Introducing Cisco Next-Generation Firewalls.mp4 17.87Мб
002. 8.1 Introducing Cisco Next-Generation Firewalls en.srt 10.40Кб
002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 28.68Мб
002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems en.srt 7.90Кб
003. 1.2 Keyloggers and Spyware.mp4 7.39Мб
003. 1.2 Keyloggers and Spyware en.srt 4.41Кб
003. 10.2 Configuring IPsec Site-to-site VPNs.mp4 5.59Мб
003. 10.2 Configuring IPsec Site-to-site VPNs en.srt 3.78Кб
003. 11.2 Exploring Clientless Remote Access VPNs.mp4 12.47Мб
003. 11.2 Exploring Clientless Remote Access VPNs en.srt 6.90Кб
003. 12.2 Surveying Patch Management in the Cloud.mp4 8.26Мб
003. 12.2 Surveying Patch Management in the Cloud en.srt 4.88Кб
003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 8.25Мб
003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification en.srt 3.83Кб
003. 14.2 Describing AMP for Endpoints Outbreak Control.mp4 16.13Мб
003. 14.2 Describing AMP for Endpoints Outbreak Control en.srt 8.64Кб
003. 2.2 Understanding Encryption Protocols.mp4 13.56Мб
003. 2.2 Understanding Encryption Protocols en.srt 7.63Кб
003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 9.64Мб
003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt 3.64Кб
003. 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 3.80Мб
003. 4.2 Exploring DevNet and DevNet Resources for Security Automation en.srt 1.61Кб
003. 5.2 Exploring the RADIUS Protocol.mp4 10.29Мб
003. 5.2 Exploring the RADIUS Protocol en.srt 5.15Кб
003. 6.2 Introducing NetFlow and IPFIX.mp4 6.60Мб
003. 6.2 Introducing NetFlow and IPFIX en.srt 3.43Кб
003. 7.2 Configuring and Verifying Port Security.mp4 11.89Мб
003. 7.2 Configuring and Verifying Port Security en.srt 5.18Кб
003. 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 44.31Мб
003. 8.2 Surveying the Cisco Firepower Management Center (FMC) en.srt 18.10Кб
003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven.mp4 8.32Мб
003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven en.srt 2.37Кб
004. 1.3 Malware Analysis Techniques.mp4 11.47Мб
004. 1.3 Malware Analysis Techniques en.srt 5.41Кб
004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 9.94Мб
004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers en.srt 5.23Кб
004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 9.34Мб
004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client en.srt 4.26Кб
004. 12.3 Performing Security Assessments in Cloud Environments.mp4 11.58Мб
004. 12.3 Performing Security Assessments in Cloud Environments en.srt 4.63Кб
004. 13.3 Introduction to Cisco Email Security.mp4 13.00Мб
004. 13.3 Introduction to Cisco Email Security en.srt 4.31Кб
004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 7.29Мб
004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions en.srt 3.24Кб
004. 2.3 Describing Hashing Algorithms.mp4 11.30Мб
004. 2.3 Describing Hashing Algorithms en.srt 5.78Кб
004. 3.3 Introducing Cisco ACI.mp4 17.68Мб
004. 3.3 Introducing Cisco ACI en.srt 9.86Кб
004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 37.47Мб
004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt 16.87Кб
004. 5.3 Surveying the TACACS+ Protocol.mp4 7.09Мб
004. 5.3 Surveying the TACACS+ Protocol en.srt 3.32Кб
004. 6.3 Describing Flexible NetFlow Records.mp4 11.19Мб
004. 6.3 Describing Flexible NetFlow Records en.srt 5.55Кб
004. 7.3 Configuring and Verifying DHCP Snooping.mp4 11.32Мб
004. 7.3 Configuring and Verifying DHCP Snooping en.srt 3.94Кб
004. 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 23.97Мб
004. 8.3 Exploring the Cisco Firepower Device Manager (FDM) en.srt 11.08Кб
004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 11.89Мб
004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems en.srt 6.48Кб
005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.mp4 12.06Мб
005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.srt 5.04Кб
005. 10.4 Exploring DMVPN.mp4 19.60Мб
005. 10.4 Exploring DMVPN en.srt 10.97Кб
005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 11.97Мб
005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD en.srt 5.11Кб
005. 12.4 Introducing Agile, DevOps, and CICD Pipelines.mp4 22.05Мб
005. 12.4 Introducing Agile, DevOps, and CICD Pipelines en.srt 12.62Кб
005. 13.4 Exploring the Cisco ESA Deployment Model.mp4 5.19Мб
005. 13.4 Exploring the Cisco ESA Deployment Model en.srt 2.79Кб
005. 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 7.09Мб
005. 14.4 Understanding AMP IP Blacklists and Whitelists en.srt 3.73Кб
005. 2.4 Introducing Public Key Infrastructure (PKI).mp4 16.74Мб
005. 2.4 Introducing Public Key Infrastructure (PKI) en.srt 7.92Кб
005. 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 28.97Мб
005. 3.4 Introducing Cisco DNA and Cisco DNA Center en.srt 10.64Кб
005. 4.4 A Brief Introduction to Git.mp4 25.27Мб
005. 4.4 A Brief Introduction to Git en.srt 10.13Кб
005. 5.4 Understanding Authorization.mp4 7.36Мб
005. 5.4 Understanding Authorization en.srt 3.38Кб
005. 6.4 Understanding NetFlow Deployment.mp4 10.54Мб
005. 6.4 Understanding NetFlow Deployment en.srt 3.95Кб
005. 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 15.58Мб
005. 7.4 Configuring and Verifying Dynamic ARP Inspection en.srt 7.23Кб
005. 8.4 Implementing Access Control Policies.mp4 7.79Мб
005. 8.4 Implementing Access Control Policies en.srt 5.55Кб
006. 1.5 Surveying Common Application-based Vulnerabilities.mp4 32.64Мб
006. 1.5 Surveying Common Application-based Vulnerabilities en.srt 8.64Кб
006. 10.5 Understanding GET VPN.mp4 15.68Мб
006. 10.5 Understanding GET VPN en.srt 8.36Кб
006. 11.5 Troubleshooting Remote Access VPN Implementations.mp4 4.68Мб
006. 11.5 Troubleshooting Remote Access VPN Implementations en.srt 2.32Кб
006. 12.5 Introducing Serverless Computing.mp4 3.68Мб
006. 12.5 Introducing Serverless Computing en.srt 1.86Кб
006. 13.5 Understanding Email Security Features.mp4 9.48Мб
006. 13.5 Understanding Email Security Features en.srt 4.66Кб
006. 14.5 Exploring Application Control in AMP for Endpoints.mp4 3.94Мб
006. 14.5 Exploring Application Control in AMP for Endpoints en.srt 1.78Кб
006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 14.99Мб
006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment en.srt 6.61Кб
006. 3.5 Understanding VXLAN and Network Overlays.mp4 9.92Мб
006. 3.5 Understanding VXLAN and Network Overlays en.srt 4.52Кб
006. 4.5 Exploring pxGrid.mp4 15.73Мб
006. 4.5 Exploring pxGrid en.srt 7.29Кб
006. 5.5 Surveying Authorization Models.mp4 14.79Мб
006. 5.5 Surveying Authorization Models en.srt 6.49Кб
006. 6.5 Exploring Cisco Stealthwatch.mp4 5.04Мб
006. 6.5 Exploring Cisco Stealthwatch en.srt 2.82Кб
006. 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 15.54Мб
006. 7.5 Exploring and Mitigating Common Layer 2 Threats en.srt 6.25Кб
007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.mp4 26.00Мб
007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.srt 11.49Кб
007. 10.6 Deploying FlexVPN.mp4 19.52Мб
007. 10.6 Deploying FlexVPN en.srt 9.59Кб
007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 5.61Мб
007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes en.srt 2.42Кб
007. 13.6 Discussing Email Security in the Cloud.mp4 9.18Мб
007. 13.6 Discussing Email Security in the Cloud en.srt 4.68Кб
007. 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 11.41Мб
007. 14.6 Describing AMP for Endpoints Exclusion Sets en.srt 5.94Кб
007. 2.6 Surveying SSL and TLS Implementations.mp4 13.73Мб
007. 2.6 Surveying SSL and TLS Implementations en.srt 6.35Кб
007. 3.6 Understanding Microsegmentation.mp4 9.23Мб
007. 3.6 Understanding Microsegmentation en.srt 6.11Кб
007. 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 11.29Мб
007. 4.6 Integrating and Automating Security Operations with Cisco Products en.srt 5.05Кб
007. 5.6 Defining Accounting.mp4 5.96Мб
007. 5.6 Defining Accounting en.srt 2.66Кб
007. 6.6 Deploying Cisco Stealthwatch Cloud.mp4 8.61Мб
007. 6.6 Deploying Cisco Stealthwatch Cloud en.srt 4.36Кб
007. 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 6.70Мб
007. 7.6 Understanding and Configuring BPDU Guard and Root Guard en.srt 3.19Кб
008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 59.27Мб
008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities en.srt 28.85Кб
008. 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 13.43Мб
008. 10.7 Troubleshooting Site-to-site VPN Implementations en.srt 7.88Кб
008. 12.7 Exploring the Concepts of DevSecOps.mp4 12.64Мб
008. 12.7 Exploring the Concepts of DevSecOps en.srt 6.26Кб
008. 13.7 Introduction to Secure Internet Gateway (SIG).mp4 6.65Мб
008. 13.7 Introduction to Secure Internet Gateway (SIG) en.srt 3.50Кб
008. 14.7 Introduction to AMP for Endpoints Policies.mp4 1.95Мб
008. 14.7 Introduction to AMP for Endpoints Policies en.srt 1.17Кб
008. 2.7 Surveying IPsec Implementations.mp4 41.70Мб
008. 2.7 Surveying IPsec Implementations en.srt 20.66Кб
008. 3.7 Surveying Open Source SDN Solutions.mp4 10.03Мб
008. 3.7 Surveying Open Source SDN Solutions en.srt 5.10Кб
008. 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 24.59Мб
008. 5.7 Exploring Multifactor Authentication and Single Sign-On en.srt 8.91Кб
008. 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 2.57Мб
008. 6.7 On-Premise Monitoring with Stealthwatch Cloud en.srt 1.18Кб
008. 7.7 Understanding and Configuring CDPLLDP.mp4 8.96Мб
008. 7.7 Understanding and Configuring CDPLLDP en.srt 3.46Кб
009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 70.87Мб
009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities en.srt 30.30Кб
009. 12.8 Surveying Cisco Umbrella.mp4 15.75Мб
009. 12.8 Surveying Cisco Umbrella en.srt 7.83Кб
009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 10.13Мб
009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella en.srt 3.55Кб
009. 14.8 Describing the Anyconnect AMP Enabler.mp4 1.14Мб
009. 14.8 Describing the Anyconnect AMP Enabler en.srt 633б
009. 3.8 Understanding the Threats Against SDN Solutions.mp4 7.36Мб
009. 3.8 Understanding the Threats Against SDN Solutions en.srt 3.49Кб
009. 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 6.79Мб
009. 5.8 Exploring Examples of Multifactor and Single Sign-On en.srt 2.38Кб
009. 6.8 Exploring the Cisco TrustSec Solution.mp4 9.99Мб
009. 6.8 Exploring the Cisco TrustSec Solution en.srt 4.47Кб
009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 15.08Мб
009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt 8.33Кб
010. 1.9 Understanding Buffer Overflows.mp4 20.08Мб
010. 1.9 Understanding Buffer Overflows en.srt 8.70Кб
010. 12.9 Exploring Cisco Cloud Email Security.mp4 5.21Мб
010. 12.9 Exploring Cisco Cloud Email Security en.srt 3.23Кб
010. 13.9 Exploring Cisco Umbrella Investigate.mp4 10.65Мб
010. 13.9 Exploring Cisco Umbrella Investigate en.srt 4.75Кб
010. 14.9 Exploring AMP for Endpoints Engines.mp4 3.30Мб
010. 14.9 Exploring AMP for Endpoints Engines en.srt 1.99Кб
010. 3.9 Understanding the Security Benefits in SDN Solutions.mp4 6.73Мб
010. 3.9 Understanding the Security Benefits in SDN Solutions en.srt 2.82Кб
010. 5.9 Understanding Cisco DUO.mp4 11.93Мб
010. 5.9 Understanding Cisco DUO en.srt 6.53Кб
010. 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 5.57Мб
010. 6.9 Describing the Benefits of Device Compliance and Application Control en.srt 2.94Кб
010. 7.9 Exploring How to Secure the Management Plane.mp4 14.22Мб
010. 7.9 Exploring How to Secure the Management Plane en.srt 7.23Кб
011. 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 11.40Мб
011. 1.10 Surveying Unsecure Code Practices and Insecure APIs en.srt 5.81Кб
011. 12.10 Exploring Cisco Cloudlock.mp4 13.50Мб
011. 12.10 Exploring Cisco Cloudlock en.srt 6.91Кб
011. 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 9.06Мб
011. 14.10 How to Utilize AMP for Endpoints Reporting Features en.srt 5.04Кб
011. 5.10 Introducing Cisco ISE.mp4 11.29Мб
011. 5.10 Introducing Cisco ISE en.srt 4.75Кб
011. 6.10 Introducing Network Segmentation.mp4 5.31Мб
011. 6.10 Introducing Network Segmentation en.srt 2.85Кб
011. 7.10 Exploring How to Secure the Control Plane.mp4 15.02Мб
011. 7.10 Exploring How to Secure the Control Plane en.srt 8.10Кб
012. 1.11 Understanding Security Threats in Cloud Environments.mp4 21.57Мб
012. 1.11 Understanding Security Threats in Cloud Environments en.srt 11.76Кб
012. 14.11 Introducing the Cisco Threat Response Solution.mp4 11.14Мб
012. 14.11 Introducing the Cisco Threat Response Solution en.srt 3.42Кб
012. 5.11 Understanding Cisco ISE Profiling Services.mp4 7.52Мб
012. 5.11 Understanding Cisco ISE Profiling Services en.srt 4.35Кб
012. 6.11 Exploring Application-based Segmentation.mp4 5.82Мб
012. 6.11 Exploring Application-based Segmentation en.srt 2.97Кб
012. 7.11 Exploring How to Secure the Data Plane.mp4 11.74Мб
012. 7.11 Exploring How to Secure the Data Plane en.srt 6.09Кб
013. 1.12 Understanding IoT Security Threats.mp4 37.32Мб
013. 1.12 Understanding IoT Security Threats en.srt 14.19Кб
013. 5.12 Understanding ISE Identity Services.mp4 11.73Мб
013. 5.12 Understanding ISE Identity Services en.srt 5.90Кб
013. 6.12 Understanding Cisco ACI.mp4 7.64Мб
013. 6.12 Understanding Cisco ACI en.srt 3.63Кб
014. 5.13 Describing ISE Authorization Rules.mp4 8.39Мб
014. 5.13 Describing ISE Authorization Rules en.srt 3.62Кб
014. 6.13 Describing Network Access with CoA.mp4 4.96Мб
014. 6.13 Describing Network Access with CoA en.srt 2.36Кб
015. 6.14 Integrating Different Security Systems Using pxGrid.mp4 9.92Мб
015. 6.14 Integrating Different Security Systems Using pxGrid en.srt 4.22Кб
016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr.mp4 18.02Мб
016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr en.srt 9.39Кб
Статистика распространения по странам
Россия (RU) 8
Южная Корея (KR) 3
Венгрия (HU) 2
США (US) 2
Казахстан (KZ) 2
Сирийская Арабская Республика (SY) 2
Иран (IR) 1
Канада (CA) 1
Филиппины (PH) 1
Всего 22
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент