资源详情

返回首页 | 相关搜索
Cisco CCNP Security SCOR (Exam 350-701)
大小 5.11 GB
文件数 120
Info Hash: 29EE833CBB2010CE1B1B11C432DCF47631924AF8
收录时间 2026-02-09 03:13:45
更新时间 2026-02-09 03:13:45
文件列表 (120)
Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.mp4
162.25 MB
Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.mp4
47.04 MB
Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.en.srt
16.32 KB
Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.mp4
73.21 MB
Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.en.srt
29.33 KB
Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.mp4
102.72 MB
Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.en.srt
21.36 KB
Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.mp4
84.93 MB
Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.en.srt
21.26 KB
Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.mp4
92.5 MB
Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.en.srt
25.54 KB
Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.mp4
101.69 MB
Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.en.srt
19.41 KB
Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.mp4
75.47 MB
Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.en.srt
36.38 KB
Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.mp4
132.42 MB
Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.en.srt
27.83 KB
Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.mp4
136.59 MB
Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.en.srt
21.93 KB
Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.mp4
102.9 MB
Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.en.srt
12.39 KB
Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.mp4
53.06 MB
Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.en.srt
28.87 KB
Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.mp4
106.02 MB
Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.en.srt
17.44 KB
Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.mp4
74.91 MB
Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.en.srt
25.83 KB
Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.mp4
143.37 MB
Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.en.srt
30.57 KB
Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.mp4
127.96 MB
Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.en.srt
21.79 KB
Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.mp4
87.7 MB
Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.en.srt
27.42 KB
Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.mp4
120.63 MB
Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.en.srt
19.91 KB
Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.mp4
97.24 MB
Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.en.srt
24.43 KB
Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.mp4
92.91 MB
Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.en.srt
17.91 KB
Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.mp4
74.74 MB
Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.en.srt
15.01 KB
Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.mp4
60.42 MB
Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.en.srt
26.05 KB
Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.mp4
111.35 MB
Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.en.srt
12.1 KB
Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.mp4
50.07 MB
Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.en.srt
37.09 KB
Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.mp4
132.73 MB
Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.en.srt
16.53 KB
Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.mp4
72.33 MB
Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.en.srt
35.72 KB
Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.mp4
123.92 MB
Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.en.srt
19.34 KB
Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.mp4
74.96 MB
Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.en.srt
26.54 KB
Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.mp4
104.32 MB
Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.en.srt
13.28 KB
Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.mp4
52.84 MB
Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.en.srt
23.65 KB
Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.mp4
87.28 MB
Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.en.srt
22.3 KB
Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.mp4
86.82 MB
Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.en.srt
19.84 KB
Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.mp4
77.5 MB
Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.en.srt
26.15 KB
Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.mp4
106.27 MB
Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.en.srt
36.29 KB
Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.mp4
131.17 MB
Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.en.srt
34.39 KB
Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.en.srt
9.84 KB
Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.en.srt
13.96 KB
Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.mp4
61.12 MB
Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.en.srt
34.74 KB
Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.mp4
132.13 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.en.srt
32.09 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.mp4
123.89 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.en.srt
21.17 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.mp4
83.66 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.en.srt
22.29 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.mp4
87 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.en.srt
19.61 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.mp4
74.43 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.en.srt
24.22 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.mp4
92.99 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.en.srt
27.14 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.mp4
84.39 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.en.srt
22.73 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.mp4
80.81 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.en.srt
11.94 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.mp4
44.38 MB
Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.en.srt
13.86 KB
Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.mp4
53.78 MB
Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.en.srt
12.4 KB
Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.mp4
46.8 MB
Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.en.srt
7.65 KB
Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.mp4
30.15 MB
Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.en.srt
19.28 KB
Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.mp4
81.84 MB
Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.en.srt
16.59 KB
Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.mp4
81.96 MB
Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.en.srt
22.09 KB
Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.mp4
99.11 MB
Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.en.srt
17.15 KB
Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.mp4
73.62 MB
Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.en.srt
23.64 KB
Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.mp4
97.76 MB
Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.en.srt
23.98 KB
Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.mp4
87.69 MB
Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.en.srt
18.12 KB
Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.mp4
67.64 MB
Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.en.srt
9 KB
Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.mp4
37.29 MB
Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.en.srt
19.89 KB
Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.mp4
81.95 MB
Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.en.srt
12.71 KB
Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.mp4
48.87 MB
Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.en.srt
13.11 KB
Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.mp4
59.22 MB
Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.en.srt
12.89 KB
Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.mp4
54.73 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。