BT种子基本信息
- 种子哈希:29ee833cbb2010ce1b1b11c432dcf47631924af8
- 文档大小:5.5 GB
- 文档个数:120个文档
- 下载次数:2796次
- 下载速度:极快
- 收录时间:2024-03-23
- 最近下载:2025-01-11
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.mp4 170.1 MB
- Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.mp4 150.3 MB
- Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.mp4 143.2 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.mp4 139.2 MB
- Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.mp4 138.9 MB
- Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.mp4 138.5 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.mp4 137.5 MB
- Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.mp4 134.2 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.mp4 129.9 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.mp4 129.9 MB
- Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.mp4 126.5 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.mp4 116.8 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.mp4 111.4 MB
- Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.mp4 111.2 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.mp4 109.4 MB
- Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.mp4 107.9 MB
- Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.mp4 107.7 MB
- Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.mp4 106.6 MB
- Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.mp4 103.9 MB
- Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.mp4 102.5 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.mp4 102.0 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.mp4 97.5 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.mp4 97.4 MB
- Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.mp4 97.0 MB
- Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.mp4 92.0 MB
- Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.mp4 91.9 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.mp4 91.5 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.mp4 91.2 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.mp4 91.0 MB
- Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.mp4 89.1 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.mp4 88.5 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.mp4 87.7 MB
- Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.mp4 85.9 MB
- Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.mp4 85.9 MB
- Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.mp4 85.8 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.mp4 84.7 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.mp4 81.3 MB
- Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.mp4 79.1 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.mp4 78.6 MB
- Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.mp4 78.5 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.mp4 78.4 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.mp4 78.0 MB
- Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.mp4 77.2 MB
- Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.mp4 76.8 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.mp4 75.8 MB
- Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.mp4 70.9 MB
- Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.mp4 64.1 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.mp4 63.4 MB
- Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.mp4 62.1 MB
- Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.mp4 57.4 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.mp4 56.4 MB
- Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.mp4 55.6 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.mp4 55.4 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.mp4 52.5 MB
- Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.mp4 51.2 MB
- Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.mp4 49.3 MB
- Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.mp4 49.1 MB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.mp4 46.5 MB
- Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.mp4 39.1 MB
- Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.mp4 31.6 MB
- Chapter 2 Advanced Network Security and Configuration Techniques/007. Private VLANs.en.srt 38.0 kB
- Chapter 1 Network Security and Cryptography Fundamentals/008. Modern Cryptographic Solutions.en.srt 37.3 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/017. Debugging and Showing IPsec Verifications.en.srt 37.2 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/009. Port Security and VLAN Hopping Attacks.en.srt 36.6 kB
- Chapter 3 Cloud Security Essentials/003. Miscellaneous Cloud Security Topics.en.srt 35.6 kB
- Chapter 3 Cloud Security Essentials/001. Cloud Deployment and Service Models.en.srt 35.2 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/001. Introducing Cisco Firepower Devices.en.srt 32.9 kB
- Chapter 1 Network Security and Cryptography Fundamentals/015. Types of Social Engineering Attacks.en.srt 31.3 kB
- Chapter 1 Network Security and Cryptography Fundamentals/003. Common Threats to On-Prem.en.srt 30.0 kB
- Chapter 1 Network Security and Cryptography Fundamentals/012. VPN Options.en.srt 29.6 kB
- Chapter 1 Network Security and Cryptography Fundamentals/009. Fundamentals of PKI.en.srt 28.5 kB
- Chapter 1 Network Security and Cryptography Fundamentals/017. Python Scripts for Security Appliance API Calls.en.srt 28.1 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/006. Configure and Verify the WSA.en.srt 27.8 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/011. Access Control Policies.en.srt 27.2 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/016. Configure and Verify the Remote Access VPN.en.srt 26.8 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/005. DHCP Snooping.en.srt 26.7 kB
- Chapter 1 Network Security and Cryptography Fundamentals/014. Endpoint Protections Social Engineering Attacks.en.srt 26.4 kB
- Chapter 1 Network Security and Cryptography Fundamentals/006. Some Attack Mitigations.en.srt 26.2 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/002. Deployment Models for Network Security.en.srt 25.0 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/005. The WSA and ESA Architectures.en.srt 24.8 kB
- Chapter 6 Advanced Cisco Network Security Techniques/001. Guest Services and BYOD.en.srt 24.6 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/013. Configure AAA for Device and Network Access.en.srt 24.2 kB
- Chapter 5 Endpoint Security and Management Strategies/007. Explain an Endpoint Patching Strategy.en.srt 24.2 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/007. Configure and Verify the ESA.en.srt 23.3 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/014. Configure Secure Network Management.en.srt 22.8 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/003. Web Proxy Identity and Authentication.en.srt 22.8 kB
- Chapter 5 Endpoint Security and Management Strategies/005. Describe an MFA Strategy.en.srt 22.6 kB
- Chapter 1 Network Security and Cryptography Fundamentals/010. Using the PKI.en.srt 22.5 kB
- Chapter 1 Network Security and Cryptography Fundamentals/016. Northbound and Southbound APIs of SDN.en.srt 22.3 kB
- Chapter 1 Network Security and Cryptography Fundamentals/004. Common Threats in the Cloud.en.srt 21.9 kB
- Chapter 1 Network Security and Cryptography Fundamentals/005. Common Security Vulnerabilities.en.srt 21.8 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/002. Traffic Redirection and Capture Methods.en.srt 21.7 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/001. Intrusion Prevention versus Firewalling.en.srt 20.4 kB
- Chapter 6 Advanced Cisco Network Security Techniques/004. Device Compliance and Application Control.en.srt 20.4 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/015. Configure and Verify the Site-to-Site VPN.en.srt 20.3 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/004. Compare ESA, CES, WSA.en.srt 20.1 kB
- Chapter 1 Network Security and Cryptography Fundamentals/007. Introduction to Cryptography.en.srt 19.9 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/010. Hardening the Network Infrastructure.en.srt 19.8 kB
- Chapter 5 Endpoint Security and Management Strategies/003. Outbreak Control.en.srt 19.7 kB
- Chapter 6 Advanced Cisco Network Security Techniques/002. Configure and Verify 802.1X, MAB, and WebAuth.en.srt 18.6 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/003. NetFlow and Flexible NetFlow.en.srt 18.3 kB
- Chapter 1 Network Security and Cryptography Fundamentals/013. Security Intelligence Auth, Sharing, Consumption.en.srt 17.9 kB
- Chapter 5 Endpoint Security and Management Strategies/006. Endpoint Posture Assessment Solutions.en.srt 17.6 kB
- Chapter 5 Endpoint Security and Management Strategies/004. Describe MDM.en.srt 17.0 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/008. Storm Control.en.srt 16.9 kB
- Chapter 1 Network Security and Cryptography Fundamentals/002. Threats, Vulnerabilities, Exploits and Mitigations.en.srt 16.7 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/004. Network Segmentation.en.srt 15.4 kB
- Chapter 3 Cloud Security Essentials/002. Security Responsibilities in the Cloud.en.srt 14.3 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/009. Configure and Verify Cisco Umbrella.en.srt 14.2 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/012. Management Options for Security Solutions.en.srt 13.6 kB
- Chapter 6 Advanced Cisco Network Security Techniques/006. Benefits of Network Telemetry.en.srt 13.4 kB
- Chapter 6 Advanced Cisco Network Security Techniques/007. Describe Various Cisco Security Products.en.srt 13.2 kB
- Chapter 6 Advanced Cisco Network Security Techniques/005. Explain Exfiltration Techniques.en.srt 13.0 kB
- Chapter 5 Endpoint Security and Management Strategies/001. EPP versus EDR and Cisco AMP.en.srt 12.7 kB
- Chapter 1 Network Security and Cryptography Fundamentals/011. IKE v1 vs IKE v2.en.srt 12.7 kB
- Chapter 2 Advanced Network Security and Configuration Techniques/006. DAI and IP Source Guard.en.srt 12.4 kB
- Chapter 4 Cisco Security Solutions Configuration and Analysis/008. Describe the Cisco Umbrella Solution.en.srt 12.2 kB
- Chapter 1 Network Security and Cryptography Fundamentals/001. Course Overview.en.srt 10.1 kB
- Chapter 6 Advanced Cisco Network Security Techniques/003. Network Access with CoA.en.srt 9.2 kB
- Chapter 5 Endpoint Security and Management Strategies/002. Miscellaneous Endpoint Security.en.srt 7.8 kB
==查看完整文档列表==