首页 磁力链接怎么用

CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR

文件类型 收录时间 最后活跃 资源热度 文件大小 文件数量
视频 2021-1-30 03:22 2024-5-14 20:59 284 16.81 GB 366
二维码链接
CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR的二维码
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
文件列表
  1. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/05 - Hardening, Protecting, and Maintaining Cloud VMs.mp4543.93MB
  2. 01 - Explain Common Threats Against On-premises and Cloud Environments/02 - Know Your Assets.mp423.14MB
  3. 01 - Explain Common Threats Against On-premises and Cloud Environments/03 - Know Your Vulnerabilities.mp415.99MB
  4. 01 - Explain Common Threats Against On-premises and Cloud Environments/04 - Know Your Threats.mp428.43MB
  5. 01 - Explain Common Threats Against On-premises and Cloud Environments/05 - Virus, Trojan, and Malware.. Oh my!.mp416.55MB
  6. 01 - Explain Common Threats Against On-premises and Cloud Environments/06 - Phishing and Social Engineering.mp417.49MB
  7. 01 - Explain Common Threats Against On-premises and Cloud Environments/07 - DDoS - Attacking Availability.mp412.63MB
  8. 01 - Explain Common Threats Against On-premises and Cloud Environments/08 - Spoofing and MitM Attacks.mp418.22MB
  9. 01 - Explain Common Threats Against On-premises and Cloud Environments/09 - Summarizing the Threat Landscape.mp48.09MB
  10. 02 - Compare Common Security Vulnerabilities/01 - Introducing Common Attack Vectors.mp47.15MB
  11. 02 - Compare Common Security Vulnerabilities/02 - Get to Know OWASP.mp432.82MB
  12. 02 - Compare Common Security Vulnerabilities/03 - The SQL Injection’; SELECT - FROM table.mp424.58MB
  13. 02 - Compare Common Security Vulnerabilities/04 - Cross-Site Scripting; var doCode{}.mp431.44MB
  14. 02 - Compare Common Security Vulnerabilities/05 - Password Protection.mp427.49MB
  15. 02 - Compare Common Security Vulnerabilities/06 - Plain-Text Protocols.mp428.52MB
  16. 02 - Compare Common Security Vulnerabilities/07 - The Buffer Overflow.mp48.84MB
  17. 02 - Compare Common Security Vulnerabilities/08 - Summarizing Common Vulnerabilities.mp45.8MB
  18. 03 - Components of Cryptography/01 - Introduction to Components of Cryptography.mp48.24MB
  19. 03 - Components of Cryptography/02 - Data Integrity.mp432.42MB
  20. 03 - Components of Cryptography/03 - Data Privacy.mp416.76MB
  21. 03 - Components of Cryptography/04 - SSL and TLS.mp431.48MB
  22. 03 - Components of Cryptography/05 - Public Key Infrastructure (PKI).mp417.67MB
  23. 03 - Components of Cryptography/06 - IPsec.mp416.54MB
  24. 03 - Components of Cryptography/07 - Authentication.mp421.57MB
  25. 03 - Components of Cryptography/08 - Components of Cryptography Summary.mp47.8MB
  26. 04 - IPsec Fundamentals/01 - Introduction to IPsec.mp47.08MB
  27. 04 - IPsec Fundamentals/02 - IPsec Overview.mp422.99MB
  28. 04 - IPsec Fundamentals/03 - IKEv1 and IKEv2.mp429.25MB
  29. 04 - IPsec Fundamentals/04 - Crypto Map IPsec.mp421.33MB
  30. 04 - IPsec Fundamentals/05 - VTI IPsec.mp417.56MB
  31. 04 - IPsec Fundamentals/06 - DMVPNs.mp411.61MB
  32. 04 - IPsec Fundamentals/07 - FlexVPN.mp412.76MB
  33. 04 - IPsec Fundamentals/08 - GET VPN.mp413.87MB
  34. 04 - IPsec Fundamentals/09 - NAT Traversal.mp424.14MB
  35. 04 - IPsec Fundamentals/10 - IPsec Fundamentals Summary.mp44.93MB
  36. 05 - Cisco Router Site-To-Site VPNs/01 - Introducing Site-To-Site VPNs.mp44.78MB
  37. 05 - Cisco Router Site-To-Site VPNs/02 - Planning for IPsec Site-To-Site.mp438.7MB
  38. 05 - Cisco Router Site-To-Site VPNs/03 - Designing a Site-To-Site VPN.mp420.49MB
  39. 05 - Cisco Router Site-To-Site VPNs/04 - Configuring an IKE Phase 1 Policy.mp446.03MB
  40. 05 - Cisco Router Site-To-Site VPNs/05 - Configuring an IKE Phase 2 (IPsec) Policy.mp466.2MB
  41. 05 - Cisco Router Site-To-Site VPNs/06 - Enabling the IPsec Policy.mp472.59MB
  42. 05 - Cisco Router Site-To-Site VPNs/07 - Protocol Analysis IPsec.mp430.6MB
  43. 06 - Cisco Point-To-Point GRE over IPsec VPNs/01 - Introduction to P2P GRE over IPsec VPNs.mp44.55MB
  44. 06 - Cisco Point-To-Point GRE over IPsec VPNs/02 - Overview of GRE over IPsec VPNs.mp436.7MB
  45. 06 - Cisco Point-To-Point GRE over IPsec VPNs/03 - P2P GRE Tunnel Design.mp49.37MB
  46. 06 - Cisco Point-To-Point GRE over IPsec VPNs/04 - P2P GRE Tunnel Implementation.mp433.17MB
  47. 06 - Cisco Point-To-Point GRE over IPsec VPNs/05 - P2P GRE Tunnel Verification.mp428.11MB
  48. 06 - Cisco Point-To-Point GRE over IPsec VPNs/06 - IPsec Tunnel Protection Design.mp414.48MB
  49. 06 - Cisco Point-To-Point GRE over IPsec VPNs/07 - IPsec Virtual Tunnel Interface Configuration.mp465.69MB
  50. 06 - Cisco Point-To-Point GRE over IPsec VPNs/08 - IPsec Static VTI Verification.mp412.44MB
  51. 07 - Cisco DMVPN/01 - Introduction to DMVPN.mp45.44MB
  52. 07 - Cisco DMVPN/02 - DMVPN Overview.mp414.74MB
  53. 07 - Cisco DMVPN/03 - Planning for the mGRE Tunnel.mp412.63MB
  54. 07 - Cisco DMVPN/04 - mGRE Tunnel Configuration.mp412.41MB
  55. 07 - Cisco DMVPN/05 - NHRP Overview and Design.mp420.73MB
  56. 07 - Cisco DMVPN/06 - Configuring NHRP for DMVPN.mp427.35MB
  57. 07 - Cisco DMVPN/07 - Adding Routing to DMVPN.mp431.64MB
  58. 07 - Cisco DMVPN/08 - Verifying DMVPNs.mp433.43MB
  59. 07 - Cisco DMVPN/09 - Adding IPsec Protection Profiles.mp442.37MB
  60. 07 - Cisco DMVPN/10 - DMVPN Summary.mp44.61MB
  61. 08 - Cisco GET VPN/01 - Introduction to GET VPN.mp410.88MB
  62. 08 - Cisco GET VPN/02 - GET VPN Overview.mp423.5MB
  63. 08 - Cisco GET VPN/03 - GET VPN Key Servers (KS).mp427.05MB
  64. 08 - Cisco GET VPN/04 - GET VPN Members (GM).mp435.08MB
  65. 08 - Cisco GET VPN/05 - GET VPN Design.mp429.83MB
  66. 08 - Cisco GET VPN/06 - Implementing KS Configuration.mp448.67MB
  67. 08 - Cisco GET VPN/07 - Implementing GM Configuration.mp430.5MB
  68. 08 - Cisco GET VPN/08 - GET VPN verification.mp442.23MB
  69. 08 - Cisco GET VPN/09 - GET VPN Summary.mp49.18MB
  70. 09 - Cisco FlexVPN/01 - Introduction to FlexVPN.mp45.87MB
  71. 09 - Cisco FlexVPN/02 - FlexVPN Overview.mp420.5MB
  72. 09 - Cisco FlexVPN/03 - FlexVPN Components.mp422.7MB
  73. 09 - Cisco FlexVPN/04 - IKEv2 Flex VPN Site-To-Site Planning.mp415.9MB
  74. 09 - Cisco FlexVPN/05 - IKEv2 FlexVPN Site-To-Site Configuration.mp435.58MB
  75. 09 - Cisco FlexVPN/06 - IKEv2 FlexVPN Verification.mp428.87MB
  76. 09 - Cisco FlexVPN/07 - Adding Routing to FlexVPN.mp422.47MB
  77. 09 - Cisco FlexVPN/08 - FlexVPN Summary.mp48.05MB
  78. 10 - Cisco Remote Access VPNs/01 - Introduction to RA VPNs.mp46.92MB
  79. 10 - Cisco Remote Access VPNs/02 - RA VPN Overview.mp420.55MB
  80. 10 - Cisco Remote Access VPNs/03 - FlexVPN IPsec RA VPNs.mp436.14MB
  81. 10 - Cisco Remote Access VPNs/04 - FlexVPN RA Design.mp413.91MB
  82. 10 - Cisco Remote Access VPNs/05 - Setting CA Services in IOS.mp439.56MB
  83. 10 - Cisco Remote Access VPNs/06 - Configuring FlexVPN RA.mp449.5MB
  84. 10 - Cisco Remote Access VPNs/07 - AnyConnect Profile Editor.mp430.85MB
  85. 10 - Cisco Remote Access VPNs/08 - Testing and Verifying the RA VPN.mp433.77MB
  86. 10 - Cisco Remote Access VPNs/09 - Flex VPN RA Summary.mp45.53MB
  87. 11 - Debugging for IPsec Tunnels/01 - Introduction to Debugging IPsec.mp44.36MB
  88. 11 - Debugging for IPsec Tunnels/02 - Overview of IPsec Options.mp410.15MB
  89. 11 - Debugging for IPsec Tunnels/03 - Troubleshooting Tips for IPsec.mp423.75MB
  90. 11 - Debugging for IPsec Tunnels/04 - IKEv1, Phase 1, Missing Routes.mp461.18MB
  91. 11 - Debugging for IPsec Tunnels/05 - IKEv1, Phase 1, Bad Config.mp457.23MB
  92. 11 - Debugging for IPsec Tunnels/06 - IKEv1, Phase 2 Bad Config.mp449.99MB
  93. 11 - Debugging for IPsec Tunnels/07 - IKEv2 Troubleshooting.mp460.95MB
  94. 11 - Debugging for IPsec Tunnels/08 - Summary Troubleshooting IPsec.mp44.73MB
  95. 12 - Security Intelligence/01 - Introduction to Security Intelligence.mp47MB
  96. 12 - Security Intelligence/02 - Security Intelligence Overview.mp466.95MB
  97. 12 - Security Intelligence/03 - Cisco Talos Overview.mp410.42MB
  98. 12 - Security Intelligence/04 - Talos Vulnerability Information.mp427.62MB
  99. 12 - Security Intelligence/05 - Talos Reputation Center.mp422.41MB
  100. 12 - Security Intelligence/06 - Security Intelligence Summary.mp48.59MB
  101. 13 - Explain APIs in the SDN Architecture/01 - Introducing APIs and SDN.mp411.76MB
  102. 13 - Explain APIs in the SDN Architecture/02 - What is an API anyway.mp434.98MB
  103. 13 - Explain APIs in the SDN Architecture/03 - The Northbound API.mp417.07MB
  104. 13 - Explain APIs in the SDN Architecture/04 - The Southbound API.mp412.11MB
  105. 13 - Explain APIs in the SDN Architecture/05 - The Eastbound API.mp418.99MB
  106. 13 - Explain APIs in the SDN Architecture/06 - The Westbound API.mp414.91MB
  107. 13 - Explain APIs in the SDN Architecture/07 - Summarizing APIs and SDN.mp412.63MB
  108. 14 - DNA Center Foundations/01 - Introducing DNA Center.mp48.09MB
  109. 14 - DNA Center Foundations/02 - What DNA Center Does.mp433.82MB
  110. 14 - DNA Center Foundations/03 - What an SD-Access Fabric Does.mp428.76MB
  111. 14 - DNA Center Foundations/04 - The Four Workflows of DNA Center.mp427.67MB
  112. 14 - DNA Center Foundations/05 - The DNA Center Platform APIs.mp422.5MB
  113. 14 - DNA Center Foundations/06 - Summarizing DNA Center.mp47.41MB
  114. 15 - Interpret Basic Python Scripts used with Cisco Security/01 - Introducing Basic Python Security Scripts.mp414.49MB
  115. 15 - Interpret Basic Python Scripts used with Cisco Security/02 - Extending Python and Setting Variables.mp462.48MB
  116. 15 - Interpret Basic Python Scripts used with Cisco Security/03 - Getting Authenticated.mp461.19MB
  117. 15 - Interpret Basic Python Scripts used with Cisco Security/04 - Getting Monitored Applications.mp445.22MB
  118. 15 - Interpret Basic Python Scripts used with Cisco Security/05 - Summarizing Interpreting Python Scripts.mp417.27MB
  119. 16 - Troubleshoot NetFlow/01 - Introduction to Troubleshooting NetFlow.mp46.03MB
  120. 16 - Troubleshoot NetFlow/02 - NetFlow Overview.mp415.01MB
  121. 16 - Troubleshoot NetFlow/03 - Flavors of NetFlow.mp422.85MB
  122. 16 - Troubleshoot NetFlow/04 - NetFlow v5.mp420.44MB
  123. 16 - Troubleshoot NetFlow/05 - Flexible NetFlow.mp432.08MB
  124. 16 - Troubleshoot NetFlow/06 - NetFlow Collectors and Analyzers.mp417.81MB
  125. 17 - The Components of Network Security Design/01 - Intro to components of Network Security Design.mp49.36MB
  126. 17 - The Components of Network Security Design/02 - Network Access Control.mp443.46MB
  127. 17 - The Components of Network Security Design/03 - End Point Security.mp423.72MB
  128. 17 - The Components of Network Security Design/04 - Next Generation Firewalls and IPS.mp437.76MB
  129. 17 - The Components of Network Security Design/05 - TrustSec and MACsec.mp424.21MB
  130. 18 - Configure and Verify Cisco Port Security/01 - Introducing Port Security.mp413.22MB
  131. 18 - Configure and Verify Cisco Port Security/02 - Understanding Port Security and Why we Need It.mp436.25MB
  132. 18 - Configure and Verify Cisco Port Security/03 - Port Security Defaults.mp423.73MB
  133. 18 - Configure and Verify Cisco Port Security/04 - Implementing Port Security on Layer 2 Interface.mp430.27MB
  134. 18 - Configure and Verify Cisco Port Security/05 - Customizing Port Security.mp451.66MB
  135. 18 - Configure and Verify Cisco Port Security/06 - Configuring Auto Errdisable Recovery.mp452.3MB
  136. 18 - Configure and Verify Cisco Port Security/07 - Applying Port Security Skills in Production.mp428.34MB
  137. 18 - Configure and Verify Cisco Port Security/08 - Review of Configure and Verify Cisco Port Security.mp410.03MB
  138. 19 - Configure and Verify Cisco DHCP Snooping/01 - Introducing DHCP Snooping.mp411.95MB
  139. 19 - Configure and Verify Cisco DHCP Snooping/02 - Why is DHCP Snooping Needed.mp437.23MB
  140. 19 - Configure and Verify Cisco DHCP Snooping/03 - The Recipe for DHCP Snooping.mp430.15MB
  141. 19 - Configure and Verify Cisco DHCP Snooping/04 - Building and Implementing DHCP Snooping in PT.mp465.92MB
  142. 19 - Configure and Verify Cisco DHCP Snooping/05 - Adding Source Guard to a Switch.mp439.89MB
  143. 19 - Configure and Verify Cisco DHCP Snooping/06 - Applying DHCP Snooping in Production.mp471.04MB
  144. 19 - Configure and Verify Cisco DHCP Snooping/07 - Review of Configure and Verify Cisco DHCP Snooping.mp413MB
  145. 20 - Configure and Verify Cisco Dynamic ARP Inspection/01 - Introducing Dynamic ARP Inspection (DAI).mp48.06MB
  146. 20 - Configure and Verify Cisco Dynamic ARP Inspection/02 - Why is DAI Needed.mp417.86MB
  147. 20 - Configure and Verify Cisco Dynamic ARP Inspection/03 - The Recipe and Commands for DAI.mp431.4MB
  148. 20 - Configure and Verify Cisco Dynamic ARP Inspection/04 - Implementing DAI.mp436.77MB
  149. 20 - Configure and Verify Cisco Dynamic ARP Inspection/05 - ARP Access Lists for Non-DHCP Devices.mp446.38MB
  150. 20 - Configure and Verify Cisco Dynamic ARP Inspection/06 - Additional DAI Options and Features.mp445.82MB
  151. 20 - Configure and Verify Cisco Dynamic ARP Inspection/07 - Applying DAI to the Production Network.mp433.32MB
  152. 20 - Configure and Verify Cisco Dynamic ARP Inspection/08 - Review of Configure and Verify Cisco Dynamic ARP Inspection.mp410.89MB
  153. 21 - Private VLANS/01 - Introduction to Private VLANs.mp410.32MB
  154. 21 - Private VLANS/02 - PVLANs Overview.mp425.6MB
  155. 21 - Private VLANS/03 - Promiscuous Ports.mp428.7MB
  156. 21 - Private VLANS/04 - PVLAN Design.mp413.83MB
  157. 21 - Private VLANS/05 - Implement PVLANs.mp423.02MB
  158. 21 - Private VLANS/06 - Verify PVLANs.mp437.41MB
  159. 21 - Private VLANS/07 - Trunking and PVLANs.mp431.66MB
  160. 21 - Private VLANS/08 - PVLAN Summary.mp47.48MB
  161. 22 - VRF-lite/01 - Introduction to VRF-lite.mp44.52MB
  162. 22 - VRF-lite/02 - VRF-lite Overview.mp443.59MB
  163. 22 - VRF-lite/03 - VRF-lite Configuration Basics.mp424.68MB
  164. 22 - VRF-lite/04 - VRFs on a Multi-Layer Switch.mp410.99MB
  165. 22 - VRF-lite/05 - VRF-lite Design.mp48.74MB
  166. 22 - VRF-lite/06 - VRF-lite Implementation.mp437.67MB
  167. 22 - VRF-lite/07 - VRF-lite Adding Routing.mp446.48MB
  168. 22 - VRF-lite/08 - VRF-lite Routing Verification.mp450.17MB
  169. 22 - VRF-lite/09 - DHCP VRF Services.mp436.68MB
  170. 22 - VRF-lite/10 - VRF-lite Summary.mp45.85MB
  171. 23 - Network Infrastructure Device Hardening/01 - Introduction to Device Hardening.mp44.6MB
  172. 23 - Network Infrastructure Device Hardening/02 - Device Hardening Overview.mp432.6MB
  173. 23 - Network Infrastructure Device Hardening/03 - Cisco Guide to Harden IOS Devices.mp421.3MB
  174. 23 - Network Infrastructure Device Hardening/04 - Management Plane Hardening.mp478.67MB
  175. 23 - Network Infrastructure Device Hardening/05 - Control Plane Hardening.mp430.23MB
  176. 23 - Network Infrastructure Device Hardening/06 - Data Plane Hardening.mp428.33MB
  177. 23 - Network Infrastructure Device Hardening/07 - Device Hardening Checklist.mp416.57MB
  178. 23 - Network Infrastructure Device Hardening/08 - Hardening Review.mp46.34MB
  179. 24 - Configure Cisco TrustSec/01 - Introduction to TrustSec.mp48.99MB
  180. 24 - Configure Cisco TrustSec/02 - TrustSec Overview.mp429.34MB
  181. 24 - Configure Cisco TrustSec/03 - TrustSec Security Groups.mp422.9MB
  182. 24 - Configure Cisco TrustSec/04 - Security Group ACLs.mp418.99MB
  183. 24 - Configure Cisco TrustSec/05 - TrustSec Policies.mp430.51MB
  184. 24 - Configure Cisco TrustSec/06 - Configure Network Devices for TrustSec.mp435.95MB
  185. 24 - Configure Cisco TrustSec/07 - ISE and NAD TrustSec Integration.mp420.19MB
  186. 24 - Configure Cisco TrustSec/08 - Verify TrustSec.mp465.63MB
  187. 24 - Configure Cisco TrustSec/09 - SGT eXchange Protocol (SXP).mp433.49MB
  188. 25 - Additional Layer 2 Security/01 - Introduction to Additional Layer 2 Security Options.mp416.04MB
  189. 25 - Additional Layer 2 Security/02 - Layer 2 Security Overview.mp440.35MB
  190. 25 - Additional Layer 2 Security/03 - Storm Control.mp481.05MB
  191. 25 - Additional Layer 2 Security/04 - Root Guard.mp468.05MB
  192. 25 - Additional Layer 2 Security/05 - BPDU Guard.mp461.81MB
  193. 25 - Additional Layer 2 Security/06 - Summary of Layer 2 Security.mp414.1MB
  194. 26 - EIGRP Neighbor Relationships and Authentication/01 - Introduction to EIGRP Relationships and Authentication.mp45.9MB
  195. 26 - EIGRP Neighbor Relationships and Authentication/02 - Neighborship Overview.mp422.79MB
  196. 26 - EIGRP Neighbor Relationships and Authentication/03 - Authentication Overview.mp460.2MB
  197. 26 - EIGRP Neighbor Relationships and Authentication/04 - EIGRP Hands on Lab with Authentication.mp443.61MB
  198. 27 - Troubleshoot OSPF Authentication for IPv4/01 - Intro to IPv4 OSPF Authentication and Troubleshooting.mp46.09MB
  199. 27 - Troubleshoot OSPF Authentication for IPv4/02 - Overview of OSPF Authentication.mp496.21MB
  200. 27 - Troubleshoot OSPF Authentication for IPv4/03 - Implement OSPF Authentication.mp471.45MB
  201. 27 - Troubleshoot OSPF Authentication for IPv4/04 - Virtual Links and Authentication.mp423.36MB
  202. 27 - Troubleshoot OSPF Authentication for IPv4/05 - Troubleshooting OSPF Authentication Lab 01.mp477.1MB
  203. 27 - Troubleshoot OSPF Authentication for IPv4/06 - Troubleshooting OSPF Authentication Lab 02.mp4101.42MB
  204. 28 - Troubleshoot OSPF Authentication for IPv6/01 - Intro to IPv6 OSPF Authentication and Troubleshooting.mp45.02MB
  205. 28 - Troubleshoot OSPF Authentication for IPv6/02 - IPv6 OSPF Authentication Overview.mp482.88MB
  206. 28 - Troubleshoot OSPF Authentication for IPv6/03 - Implement and Verify Authentication.mp445.23MB
  207. 28 - Troubleshoot OSPF Authentication for IPv6/04 - Troubleshooting OSPF Authentication Lab 01.mp467.41MB
  208. 28 - Troubleshoot OSPF Authentication for IPv6/05 - Troubleshooting OSPF Authentication Lab 02.mp453.69MB
  209. 29 - Firepower Access Control Policies/01 - Access Control Policy Overview.mp432.58MB
  210. 29 - Firepower Access Control Policies/02 - Access Control Policy Rule Actions Concepts.mp424.91MB
  211. 29 - Firepower Access Control Policies/03 - Access Control Policy Rule Actions Demonstration.mp425.78MB
  212. 29 - Firepower Access Control Policies/04 - URL Filtering.mp426.33MB
  213. 29 - Firepower Access Control Policies/05 - Malware and File Inspections.mp434.08MB
  214. 29 - Firepower Access Control Policies/06 - SSL-TLS Decryption.mp433.69MB
  215. 29 - Firepower Access Control Policies/07 - IPS Inspection.mp418.3MB
  216. 30 - Management Options to Improve Security/01 - Introduction to Secure Network Management.mp46.52MB
  217. 30 - Management Options to Improve Security/02 - Overview of Secure Management.mp439.44MB
  218. 30 - Management Options to Improve Security/03 - Syslog Overview.mp438.17MB
  219. 30 - Management Options to Improve Security/04 - NTP with Authentication.mp439.33MB
  220. 30 - Management Options to Improve Security/05 - Change Control.mp413.82MB
  221. 31 - Troubleshoot SNMP/01 - Introduction to Troubleshooting SNMP.mp44.74MB
  222. 31 - Troubleshoot SNMP/02 - SNMP Overview.mp437.78MB
  223. 31 - Troubleshoot SNMP/03 - SNMPv2 Configuration.mp448.34MB
  224. 31 - Troubleshoot SNMP/04 - SNMPv3 Client Configuration.mp462.07MB
  225. 31 - Troubleshoot SNMP/05 - SNMPv3 Server Configuration.mp422.79MB
  226. 31 - Troubleshoot SNMP/06 - Troubleshooting SNMP.mp434.15MB
  227. 32 - Troubleshoot Network Problems using Logging/01 - Introduction to Troubleshooting using Logging.mp44.87MB
  228. 32 - Troubleshoot Network Problems using Logging/02 - Logging Overview.mp420.47MB
  229. 32 - Troubleshoot Network Problems using Logging/03 - Configuring Logging.mp463.39MB
  230. 32 - Troubleshoot Network Problems using Logging/04 - Conditional Debugging.mp444MB
  231. 33 - Cloud Service and Deployment Models/01 - Planning for Cloud Services.mp4131.27MB
  232. 33 - Cloud Service and Deployment Models/02 - Plan for Infrastructure As A Service.mp4106.06MB
  233. 33 - Cloud Service and Deployment Models/03 - Plan for Platform As A Service.mp494.31MB
  234. 33 - Cloud Service and Deployment Models/04 - Plan for Software As A Service.mp480.32MB
  235. 33 - Cloud Service and Deployment Models/05 - Plan for Cloud Deployment Models.mp4136.3MB
  236. 34 - Planning for Software Development Methodologies/01 - Software and App Development Methodologies.mp443.74MB
  237. 34 - Planning for Software Development Methodologies/02 - Plan for Waterfall Method.mp484.38MB
  238. 34 - Planning for Software Development Methodologies/03 - Plan for Lean and Agile Methods.mp481.04MB
  239. 34 - Planning for Software Development Methodologies/04 - Plan for Kanban and Scrum Teams.mp452.18MB
  240. 34 - Planning for Software Development Methodologies/05 - Continuous Integration, Deployment, and Delivery.mp465.72MB
  241. 34 - Planning for Software Development Methodologies/06 - Understand CICD Pipelines in Action.mp4103.21MB
  242. 34 - Planning for Software Development Methodologies/07 - Plan for DevOps.mp4111.09MB
  243. 34 - Planning for Software Development Methodologies/08 - Plan for DevSecOps.mp4108.79MB
  244. 35 - Planning for and Securing Cloud Software-as-a-Service/01 - Planning for Software-as-a-Service Security.mp483.83MB
  245. 35 - Planning for and Securing Cloud Software-as-a-Service/02 - Federating Identities with SAML, OAuth, and OpenID.mp4265.5MB
  246. 35 - Planning for and Securing Cloud Software-as-a-Service/03 - Cisco Zero-Trust for the Workforce.mp4405.78MB
  247. 35 - Planning for and Securing Cloud Software-as-a-Service/04 - Cisco Cloudlock Access Security Broker.mp4294.19MB
  248. 35 - Planning for and Securing Cloud Software-as-a-Service/05 - Securing DNS with Cisco Umbrella and OpenDNS.mp4415.29MB
  249. 35 - Planning for and Securing Cloud Software-as-a-Service/06 - Securing Communications with Cisco Email Security.mp4448.6MB
  250. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/01 - Planning for Cloud Infrastructure Security.mp469.65MB
  251. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/02 - Assessing Cloud Service Providers.mp4228.09MB
  252. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/03 - Isolating and Segmenting Cloud Networks.mp4332.82MB
  253. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/04 - Leveraging Virtual Appliances.mp4397.41MB
  254. 01 - Explain Common Threats Against On-premises and Cloud Environments/01 - Introducing the Cybersecurity Landscape.mp416.31MB
  255. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/06 - Planning for Infrastructure-as-Code.mp4389.13MB
  256. 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/07 - Zero Trust Token Auth Demo.mp4210.06MB
  257. 37 - Planning for and Securing Cloud Platform-as-a-Service/01 - Securing Cloud Platform-as-a-Service.mp468.87MB
  258. 37 - Planning for and Securing Cloud Platform-as-a-Service/02 - Plan for Containers.mp4363.64MB
  259. 37 - Planning for and Securing Cloud Platform-as-a-Service/03 - Secure Container Images and Registries.mp4431.65MB
  260. 37 - Planning for and Securing Cloud Platform-as-a-Service/04 - Orchestrating Containers.mp4396.13MB
  261. 37 - Planning for and Securing Cloud Platform-as-a-Service/05 - Open Web Application Security Project Controls.mp4266.15MB
  262. 37 - Planning for and Securing Cloud Platform-as-a-Service/06 - OWASP Protective Controls Continued.mp4267.67MB
  263. 37 - Planning for and Securing Cloud Platform-as-a-Service/07 - Cisco Zero-Trust Architecture Overview.mp4267.32MB
  264. 37 - Planning for and Securing Cloud Platform-as-a-Service/08 - Securing Workloads with Cisco Tetration.mp4536.24MB
  265. 37 - Planning for and Securing Cloud Platform-as-a-Service/09 - Visibility with Cisco AppDynamics.mp4424.65MB
  266. 38 - Capture and Redirection Methods/01 - Introduction to Capture and Redirection Methods.mp46.39MB
  267. 38 - Capture and Redirection Methods/02 - Capture and Redirection Overview.mp412.4MB
  268. 38 - Capture and Redirection Methods/03 - Policy Based Routing (PBR) Overview.mp410.78MB
  269. 38 - Capture and Redirection Methods/04 - PBR Configuration and Testing.mp429.38MB
  270. 38 - Capture and Redirection Methods/05 - WCCP Overview and Planning.mp410.71MB
  271. 38 - Capture and Redirection Methods/06 - WSA Configuration for WCCP.mp420.13MB
  272. 38 - Capture and Redirection Methods/07 - IOS Configuration for WCCP.mp442.23MB
  273. 38 - Capture and Redirection Methods/08 - Testing WCCP.mp416.87MB
  274. 38 - Capture and Redirection Methods/09 - Traffic Redirection Summary.mp48.59MB
  275. 39 - Cisco Web Security/01 - Introduction to Cisco Web Security.mp45.47MB
  276. 39 - Cisco Web Security/02 - Web Security Appliance Overview.mp433.26MB
  277. 39 - Cisco Web Security/03 - WSA and AD Integration.mp418.93MB
  278. 39 - Cisco Web Security/04 - WSA Identification Profiles.mp429.91MB
  279. 39 - Cisco Web Security/05 - WSA Access Policies.mp427.62MB
  280. 39 - Cisco Web Security/06 - WSA Application Filtering.mp429.04MB
  281. 39 - Cisco Web Security/07 - WSA TLS Decryption Overview.mp415.44MB
  282. 39 - Cisco Web Security/08 - WSA Certificate Management.mp433.96MB
  283. 39 - Cisco Web Security/09 - WSA Decryption Policy.mp432.72MB
  284. 39 - Cisco Web Security/10 - WSA Additional Security Features.mp416.78MB
  285. 40 - Cisco Email Security/01 - Introduction to Cisco Email Security.mp43.96MB
  286. 40 - Cisco Email Security/02 - Cisco Email Security Overview.mp425.68MB
  287. 40 - Cisco Email Security/03 - ESA Inbound Mail Overview.mp434.48MB
  288. 40 - Cisco Email Security/04 - Blocking Incoming Email.mp419.93MB
  289. 40 - Cisco Email Security/05 - ESA Outbound Mail Overview.mp432.16MB
  290. 40 - Cisco Email Security/06 - SPAM Filtering.mp417.28MB
  291. 40 - Cisco Email Security/07 - Email Anti-Virus.mp49.08MB
  292. 40 - Cisco Email Security/08 - DLP.mp414.98MB
  293. 40 - Cisco Email Security/09 - Encryption.mp415.99MB
  294. 41 - Cisco Umbrella/01 - Introduction to Cisco Umbrella.mp46.02MB
  295. 41 - Cisco Umbrella/02 - Cisco Umbrella Overview.mp450.48MB
  296. 41 - Cisco Umbrella/03 - Umbrella Components.mp438.5MB
  297. 41 - Cisco Umbrella/04 - Policy Overview.mp475.03MB
  298. 41 - Cisco Umbrella/05 - Policy Components.mp430.57MB
  299. 41 - Cisco Umbrella/06 - Policy Creation.mp425.34MB
  300. 41 - Cisco Umbrella/07 - Core Identities.mp424MB
  301. 41 - Cisco Umbrella/08 - Umbrella CA Certificates.mp423.22MB
  302. 41 - Cisco Umbrella/09 - Reporting and Investigation.mp422.35MB
  303. 41 - Cisco Umbrella/10 - Umbrella VA.mp494.66MB
  304. 41 - Cisco Umbrella/11 - Umbrella Summary.mp46.88MB
  305. 42 - Understand and Configure AMP for Endpoints/01 - Introducing Endpoint Security.mp425.93MB
  306. 42 - Understand and Configure AMP for Endpoints/02 - The Types of Endpoint Protection.mp421.29MB
  307. 42 - Understand and Configure AMP for Endpoints/03 - Introducing Advanced Malware Protection (AMP) for Endpoints.mp432.83MB
  308. 42 - Understand and Configure AMP for Endpoints/04 - Configuring Simple Outbreak Controls in AMP.mp431.08MB
  309. 42 - Understand and Configure AMP for Endpoints/05 - Explore Other Outbreak Controls.mp423.05MB
  310. 42 - Understand and Configure AMP for Endpoints/06 - Understand Groups and Policies.mp422.64MB
  311. 42 - Understand and Configure AMP for Endpoints/07 - Summarizing Endpoint Security.mp46.7MB
  312. 43 - Explain Various Types of Endpoint Defenses/01 - Introducing Endpoint Defense Mechanisms.mp414.94MB
  313. 43 - Explain Various Types of Endpoint Defenses/02 - Anti-Virus and Anti-Malware.mp420.86MB
  314. 43 - Explain Various Types of Endpoint Defenses/03 - Indicators of Compromise (IoC).mp422.43MB
  315. 43 - Explain Various Types of Endpoint Defenses/04 - Retrospective Analysis.mp415.34MB
  316. 43 - Explain Various Types of Endpoint Defenses/05 - Dynamic File Analysis.mp417.02MB
  317. 43 - Explain Various Types of Endpoint Defenses/06 - Summarizing Endpoint Protection Mechanisms.mp49.49MB
  318. 44 - Endpoint Security/01 - Introduction to Endpoint Security.mp415.59MB
  319. 44 - Endpoint Security/02 - Why Endpoint Protection is Critical.mp420.24MB
  320. 44 - Endpoint Security/03 - The Value of Mobile Device Management.mp422.89MB
  321. 44 - Endpoint Security/04 - Using Multi-Factor Authentication.mp448.79MB
  322. 44 - Endpoint Security/05 - Posture Assessment for Endpoint Security.mp426.18MB
  323. 44 - Endpoint Security/06 - Patching Endpoints.mp415.06MB
  324. 45 - Describe Controls for End Users' Network Access/01 - Introducing Network Access Control for Endpoints.mp416.14MB
  325. 45 - Describe Controls for End Users' Network Access/02 - Endpoint Profiling.mp442.47MB
  326. 45 - Describe Controls for End Users' Network Access/03 - Identity-Based Authentication.mp438.41MB
  327. 45 - Describe Controls for End Users' Network Access/04 - Authenticating with AnyConnect.mp444.3MB
  328. 45 - Describe Controls for End Users' Network Access/05 - Posture Assessment.mp427.75MB
  329. 45 - Describe Controls for End Users' Network Access/06 - Cisco TrustSec and Security Group Tags (SGTs).mp431.99MB
  330. 45 - Describe Controls for End Users' Network Access/07 - Change of Authorization (CoA).mp428.13MB
  331. 45 - Describe Controls for End Users' Network Access/08 - Summarizing Network Access Controls for Endpoints.mp47.06MB
  332. 46 - 802.1X Fundamentals/01 - Introduction to 802.1x Fundamentals.mp48.85MB
  333. 46 - 802.1X Fundamentals/02 - Network Authentication and Authorization.mp434.09MB
  334. 46 - 802.1X Fundamentals/03 - Options for Authentication.mp433.43MB
  335. 46 - 802.1X Fundamentals/04 - Options after Authentication.mp434.92MB
  336. 47 - Configure a Switch for 802.1X/01 - Introduction to Switch Configuration for 802.1X.mp45.08MB
  337. 47 - Configure a Switch for 802.1X/02 - Configure Global AAA Parameters.mp443.12MB
  338. 47 - Configure a Switch for 802.1X/03 - Port Configuration.mp432.7MB
  339. 47 - Configure a Switch for 802.1X/04 - Testing and Verifying.mp424.78MB
  340. 47 - Configure a Switch for 802.1X/05 - Switch Configuration Summary.mp43.24MB
  341. 48 - Configure ISE for 802.1X/01 - Introduction to Configuring ISE.mp45.48MB
  342. 48 - Configure ISE for 802.1X/02 - Identity Stores.mp412.59MB
  343. 48 - Configure ISE for 802.1X/03 - Configure ISE to use AD.mp413.92MB
  344. 48 - Configure ISE for 802.1X/04 - Adding Network Devices to ISE.mp426.38MB
  345. 48 - Configure ISE for 802.1X/05 - Policy Set Overview.mp456.52MB
  346. 48 - Configure ISE for 802.1X/06 - Creating a Policy Set.mp451.4MB
  347. 48 - Configure ISE for 802.1X/07 - Authorization Policies.mp439.87MB
  348. 48 - Configure ISE for 802.1X/08 - Summary.mp47.36MB
  349. 49 - Explain Exfiltration Techniques/01 - Introducing Attacker Exfiltration Techniques.mp413.48MB
  350. 49 - Explain Exfiltration Techniques/02 - DNS Tunneling Exfiltration.mp428.06MB
  351. 49 - Explain Exfiltration Techniques/03 - HTTP(S) Exfiltration.mp432.35MB
  352. 49 - Explain Exfiltration Techniques/04 - Outbound File Transfers.mp418.81MB
  353. 49 - Explain Exfiltration Techniques/05 - Text-Based Protocols.mp423.34MB
  354. 49 - Explain Exfiltration Techniques/06 - Recapping Exfiltration Techniques.mp47.96MB
  355. 50 - Explaining the Benefits of Streaming Telemetry/01 - Introducing Streaming Telemetry.mp414.31MB
  356. 50 - Explaining the Benefits of Streaming Telemetry/02 - What is Telemetry.mp417.41MB
  357. 50 - Explaining the Benefits of Streaming Telemetry/03 - Network Telemetry.mp427.34MB
  358. 50 - Explaining the Benefits of Streaming Telemetry/04 - Endpoint Telemetry.mp425.06MB
  359. 50 - Explaining the Benefits of Streaming Telemetry/05 - Summarizing Telemetry.mp47.17MB
  360. 51 - Describing the Features of Various Cisco Security Offerings/01 - Introducing Cisco Security Platforms.mp44.71MB
  361. 51 - Describing the Features of Various Cisco Security Offerings/02 - Stealthwatch.mp430.87MB
  362. 51 - Describing the Features of Various Cisco Security Offerings/03 - pXGrid.mp427.55MB
  363. 51 - Describing the Features of Various Cisco Security Offerings/04 - Umbrella Investigate.mp430.62MB
  364. 51 - Describing the Features of Various Cisco Security Offerings/05 - Cognitive Threat Analytics.mp418.12MB
  365. 51 - Describing the Features of Various Cisco Security Offerings/06 - AnyConnect Network Visibility Module.mp422.29MB
  366. 51 - Describing the Features of Various Cisco Security Offerings/07 - Summarizing Cisco Security Platforms.mp44.92MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!

违规内容投诉邮箱:[email protected]

概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统