TorBT - Torrents and Magnet Links Search Engine
CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1)
- Date: 2024-10-11
- Size: 1.7 GB
- Files: 154
File Name
Size
Lesson 2 Cybersecurity Concepts/012. 2.11 Malware Communication Methods, and Infection Mechanisms.mp4
52 MB
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Introduction.mp4
12 MB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/001. Learning objectives.en.srt
1.1 kB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/001. Learning objectives.mp4
5.6 MB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/002. 1.1 Introducing the CCNP and CCIE Security Certifications.en.srt
17 kB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/002. 1.1 Introducing the CCNP and CCIE Security Certifications.mp4
45 MB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/003. 1.2 Comparing the CCNP and CCIE Security Certifications with Other Cisco Certifications.en.srt
10 kB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/003. 1.2 Comparing the CCNP and CCIE Security Certifications with Other Cisco Certifications.mp4
32 MB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/004. 1.3 Exam Prep Tips.en.srt
6.2 kB
Lesson 1 Introduction to the CCNP and CCIE Security Certifications/004. 1.3 Exam Prep Tips.mp4
16 MB
Lesson 2 Cybersecurity Concepts/001. Learning objectives.en.srt
2.9 kB
Lesson 2 Cybersecurity Concepts/001. Learning objectives.mp4
14 MB
Lesson 2 Cybersecurity Concepts/002. 2.1 Cybersecurity Concepts, The NIST Cybersecurity Framework, and Additional NIST Guidance and Documents.en.srt
6.5 kB
Lesson 2 Cybersecurity Concepts/002. 2.1 Cybersecurity Concepts, The NIST Cybersecurity Framework, and Additional NIST Guidance and Documents.mp4
28 MB
Lesson 2 Cybersecurity Concepts/003. 2.2 Defining Threats, Vulnerabilities, and Exploits.en.srt
9.3 kB
Lesson 2 Cybersecurity Concepts/003. 2.2 Defining Threats, Vulnerabilities, and Exploits.mp4
21 MB
Lesson 2 Cybersecurity Concepts/004. 2.3 An Introduction to Incident Response Part 1.en.srt
9.2 kB
Lesson 2 Cybersecurity Concepts/004. 2.3 An Introduction to Incident Response Part 1.mp4
37 MB
Lesson 2 Cybersecurity Concepts/005. 2.4 An Introduction to Incident Response Part 2.en.srt
8.6 kB
Lesson 2 Cybersecurity Concepts/005. 2.4 An Introduction to Incident Response Part 2.mp4
49 MB
Lesson 2 Cybersecurity Concepts/006. 2.5 ISOIEC 270022022 and NIST Incident Response Guidance.en.srt
13 kB
Lesson 2 Cybersecurity Concepts/006. 2.5 ISOIEC 270022022 and NIST Incident Response Guidance.mp4
27 MB
Lesson 2 Cybersecurity Concepts/007. 2.6 Understanding Threat Intelligence.en.srt
16 kB
Lesson 2 Cybersecurity Concepts/007. 2.6 Understanding Threat Intelligence.mp4
36 MB
Lesson 2 Cybersecurity Concepts/008. 2.7 Understanding Threat Hunting.en.srt
10 kB
Lesson 2 Cybersecurity Concepts/008. 2.7 Understanding Threat Hunting.mp4
23 MB
Lesson 2 Cybersecurity Concepts/009. 2.8 Common Software and Hardware Vulnerabilities.en.srt
6.5 kB
Lesson 2 Cybersecurity Concepts/009. 2.8 Common Software and Hardware Vulnerabilities.mp4
26 MB
Lesson 2 Cybersecurity Concepts/010. 2.9 Authentication-based Vulnerabilities and the OWASP Top 10.en.srt
9.5 kB
Lesson 2 Cybersecurity Concepts/010. 2.9 Authentication-based Vulnerabilities and the OWASP Top 10.mp4
38 MB
Lesson 2 Cybersecurity Concepts/011. 2.10 Malware Types, Payloads, and Transmission Methods.en.srt
14 kB
Lesson 2 Cybersecurity Concepts/011. 2.10 Malware Types, Payloads, and Transmission Methods.mp4
40 MB
Lesson 2 Cybersecurity Concepts/012. 2.11 Malware Communication Methods, and Infection Mechanisms.en.srt
14 kB
Introduction/001. CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Introduction.en.srt
2.5 kB
Lesson 2 Cybersecurity Concepts/013. 2.12 Ransomware, Keyloggers, Spyware, and Tips for Analyzing Malware.en.srt
13 kB
Lesson 2 Cybersecurity Concepts/013. 2.12 Ransomware, Keyloggers, Spyware, and Tips for Analyzing Malware.mp4
45 MB
Lesson 2 Cybersecurity Concepts/014. 2.13 Static Analysis vs. Dynamic Analysis.en.srt
7.8 kB
Lesson 2 Cybersecurity Concepts/014. 2.13 Static Analysis vs. Dynamic Analysis.mp4
24 MB
Lesson 3 Network Security/001. Learning objectives.en.srt
2.6 kB
Lesson 3 Network Security/001. Learning objectives.mp4
13 MB
Lesson 3 Network Security/002. 3.1 Traditional Networking Planes and Introduction to Software-Defined Networking.en.srt
16 kB
Lesson 3 Network Security/002. 3.1 Traditional Networking Planes and Introduction to Software-Defined Networking.mp4
43 MB
Lesson 3 Network Security/003. 3.2 VXLAN and Network Overlays.en.srt
7.2 kB
Lesson 3 Network Security/003. 3.2 VXLAN and Network Overlays.mp4
19 MB
Lesson 3 Network Security/004. 3.3 Micro-Segmentation.en.srt
7.0 kB
Lesson 3 Network Security/004. 3.3 Micro-Segmentation.mp4
15 MB
Lesson 3 Network Security/005. 3.4 Open-Source Initiatives.en.srt
9.6 kB
Lesson 3 Network Security/005. 3.4 Open-Source Initiatives.mp4
23 MB
Lesson 3 Network Security/006. 3.5 Modern Network Architectures and the Cisco Catalyst Center.en.srt
8.5 kB
Lesson 3 Network Security/006. 3.5 Modern Network Architectures and the Cisco Catalyst Center.mp4
17 MB
Lesson 3 Network Security/007. 3.6 Introduction to the Cisco ACI Solution.en.srt
6.8 kB
Lesson 3 Network Security/007. 3.6 Introduction to the Cisco ACI Solution.mp4
16 MB
Lesson 3 Network Security/008. 3.7 Introduction to Network Programmability, Modern Programming Languages, and Tools.en.srt
9.3 kB
Lesson 3 Network Security/008. 3.7 Introduction to Network Programmability, Modern Programming Languages, and Tools.mp4
27 MB
Lesson 3 Network Security/009. 3.8 DevNet Resources and Getting Started with APIs.en.srt
6.3 kB
Lesson 3 Network Security/009. 3.8 DevNet Resources and Getting Started with APIs.mp4
19 MB
Lesson 3 Network Security/010. 3.9 YANG Models, NETCONF, and RESTCONF.en.srt
9.4 kB
Lesson 3 Network Security/010. 3.9 YANG Models, NETCONF, and RESTCONF.mp4
24 MB
Lesson 3 Network Security/011. 3.10 OpenConfig and gNMI.en.srt
8.0 kB
Lesson 3 Network Security/011. 3.10 OpenConfig and gNMI.mp4
18 MB
Lesson 4 Securing the Cloud/001. Learning objectives.en.srt
2.1 kB
Lesson 4 Securing the Cloud/001. Learning objectives.mp4
11 MB
Lesson 4 Securing the Cloud/002. 4.1 Cloud Service Models and Security.en.srt
7.0 kB
Lesson 4 Securing the Cloud/002. 4.1 Cloud Service Models and Security.mp4
17 MB
Lesson 4 Securing the Cloud/003. 4.2 DevOps, CICD and DevSecOps.en.srt
9.6 kB
Lesson 4 Securing the Cloud/003. 4.2 DevOps, CICD and DevSecOps.mp4
36 MB
Lesson 4 Securing the Cloud/004. 4.3 Container Orchestration and Kubernetes.en.srt
9.0 kB
Lesson 4 Securing the Cloud/004. 4.3 Container Orchestration and Kubernetes.mp4
29 MB
Lesson 4 Securing the Cloud/005. 4.4 Serverless Computing.en.srt
5.0 kB
Lesson 4 Securing the Cloud/005. 4.4 Serverless Computing.mp4
17 MB
Lesson 4 Securing the Cloud/006. 4.5 Introducing DevSecOps.en.srt
5.3 kB
Lesson 4 Securing the Cloud/006. 4.5 Introducing DevSecOps.mp4
12 MB
Lesson 4 Securing the Cloud/007. 4.6 Patch Management in the Cloud.en.srt
8.9 kB
Lesson 4 Securing the Cloud/007. 4.6 Patch Management in the Cloud.mp4
40 MB
Lesson 4 Securing the Cloud/008. 4.7 Security Assessment in the Cloud, and Questions to Ask Your Cloud Service Provider.en.srt
6.0 kB
Lesson 4 Securing the Cloud/008. 4.7 Security Assessment in the Cloud, and Questions to Ask Your Cloud Service Provider.mp4
17 MB
Lesson 4 Securing the Cloud/009. 4.8 The Cisco Umbrella Architecture.en.srt
12 kB
Lesson 4 Securing the Cloud/009. 4.8 The Cisco Umbrella Architecture.mp4
32 MB
Lesson 4 Securing the Cloud/010. 4.9 Cisco Secure Email Cloud.en.srt
4.6 kB
Lesson 4 Securing the Cloud/010. 4.9 Cisco Secure Email Cloud.mp4
15 MB
Lesson 4 Securing the Cloud/011. 4.10 Cisco Secure Cloud Analytics.en.srt
7.8 kB
Lesson 4 Securing the Cloud/011. 4.10 Cisco Secure Cloud Analytics.mp4
27 MB
Lesson 4 Securing the Cloud/012. 4.11 AppDynamics, Cloud Monitoring, and Cisco Secure Workload.en.srt
6.1 kB
Lesson 4 Securing the Cloud/012. 4.11 AppDynamics, Cloud Monitoring, and Cisco Secure Workload.mp4
13 MB
Lesson 5 Content Security/001. Learning objectives.en.srt
730 B
Lesson 5 Content Security/001. Learning objectives.mp4
4.0 MB
Lesson 5 Content Security/002. 5.1 Content Security Fundamentals.en.srt
8.1 kB
Lesson 5 Content Security/002. 5.1 Content Security Fundamentals.mp4
25 MB
Lesson 5 Content Security/003. 5.2 Cisco Async Operating System (AsyncOS).en.srt
3.2 kB
Lesson 5 Content Security/003. 5.2 Cisco Async Operating System (AsyncOS).mp4
6.2 MB
Lesson 5 Content Security/004. 5.3 Cisco Secure Web Appliance.en.srt
5.5 kB
Lesson 5 Content Security/004. 5.3 Cisco Secure Web Appliance.mp4
17 MB
Lesson 5 Content Security/005. 5.4 Explicit Forward Mode vs. Transparent Mode.en.srt
5.6 kB
Lesson 5 Content Security/005. 5.4 Explicit Forward Mode vs. Transparent Mode.mp4
11 MB
Lesson 5 Content Security/006. 5.5 Traffic Redirection with Policy-based Routing.en.srt
8.4 kB
Lesson 5 Content Security/006. 5.5 Traffic Redirection with Policy-based Routing.mp4
30 MB
Lesson 5 Content Security/007. 5.6 Cisco Secure Email Threat Defense.en.srt
8.4 kB
Lesson 5 Content Security/007. 5.6 Cisco Secure Email Threat Defense.mp4
19 MB
Lesson 5 Content Security/008. 5.7 SMTP Authentication and Encryption and DKIM.en.srt
9.9 kB
Lesson 5 Content Security/008. 5.7 SMTP Authentication and Encryption and DKIM.mp4
27 MB
Lesson 6 Endpoint Protection and Detection/001. Learning objectives.en.srt
613 B
Lesson 6 Endpoint Protection and Detection/001. Learning objectives.mp4
3.1 MB
Lesson 6 Endpoint Protection and Detection/002. 6.1 Endpoint Threat Detection and Response.en.srt
7.0 kB
Lesson 6 Endpoint Protection and Detection/002. 6.1 Endpoint Threat Detection and Response.mp4
26 MB
Lesson 6 Endpoint Protection and Detection/003. 6.2 Cisco Secure Endpoint.en.srt
6.1 kB
Lesson 6 Endpoint Protection and Detection/003. 6.2 Cisco Secure Endpoint.mp4
22 MB
Lesson 6 Endpoint Protection and Detection/004. 6.3 Cisco Secure Client.en.srt
6.4 kB
Lesson 6 Endpoint Protection and Detection/004. 6.3 Cisco Secure Client.mp4
14 MB
Lesson 6 Endpoint Protection and Detection/005. 6.4 Cisco XDR.en.srt
8.7 kB
Lesson 6 Endpoint Protection and Detection/005. 6.4 Cisco XDR.mp4
26 MB
Lesson 7 Identity Management and AAA/001. Learning objectives.en.srt
1.1 kB
Lesson 7 Identity Management and AAA/001. Learning objectives.mp4
6.1 MB
Lesson 7 Identity Management and AAA/002. 7.1 Introduction to Authentication, Authorization, and Accounting.en.srt
11 kB
Lesson 7 Identity Management and AAA/002. 7.1 Introduction to Authentication, Authorization, and Accounting.mp4
17 MB
Lesson 7 Identity Management and AAA/003. 7.2 Multifactor Authentication and Duo Security.en.srt
12 kB
Lesson 7 Identity Management and AAA/003. 7.2 Multifactor Authentication and Duo Security.mp4
36 MB
Lesson 7 Identity Management and AAA/004. 7.3 Understanding the Zero Trust Architecture.en.srt
9.9 kB
Lesson 7 Identity Management and AAA/004. 7.3 Understanding the Zero Trust Architecture.mp4
28 MB
Lesson 7 Identity Management and AAA/005. 7.4 Access Control DAC.en.srt
7.1 kB
Lesson 7 Identity Management and AAA/005. 7.4 Access Control DAC.mp4
12 MB
Lesson 7 Identity Management and AAA/006. 7.5 Access Control MAC.en.srt
8.9 kB
Lesson 7 Identity Management and AAA/006. 7.5 Access Control MAC.mp4
19 MB
Lesson 7 Identity Management and AAA/007. 7.6 Access Control RBAC.en.srt
2.1 kB
Lesson 7 Identity Management and AAA/007. 7.6 Access Control RBAC.mp4
4.2 MB
Lesson 7 Identity Management and AAA/008. 7.7 Access Control ABAC.en.srt
5.9 kB
Lesson 7 Identity Management and AAA/008. 7.7 Access Control ABAC.mp4
22 MB
Lesson 7 Identity Management and AAA/009. 7.8 AAA Protocols RADIUS, TACACS+, Diameter.en.srt
4.9 kB
Lesson 7 Identity Management and AAA/009. 7.8 AAA Protocols RADIUS, TACACS+, Diameter.mp4
14 MB
Lesson 7 Identity Management and AAA/010. 7.9 Understanding 802.1X and TrustSec Software-defined Segmentation.en.srt
8.1 kB
Lesson 7 Identity Management and AAA/010. 7.9 Understanding 802.1X and TrustSec Software-defined Segmentation.mp4
28 MB
Lesson 7 Identity Management and AAA/011. 7.10 Change of Authorization (CoA).en.srt
3.3 kB
Lesson 7 Identity Management and AAA/011. 7.10 Change of Authorization (CoA).mp4
11 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/001. Learning objectives.en.srt
1006 B
Lesson 8 Secure Network Access, Visibility, and Enforcement/001. Learning objectives.mp4
5.7 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/002. 8.1 Cisco Secure Firewalls and Cisco Next-Generation Intrusion Prevention Systems.en.srt
13 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/002. 8.1 Cisco Secure Firewalls and Cisco Next-Generation Intrusion Prevention Systems.mp4
43 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/003. 8.2 Network Access Control List and Firewalling.en.srt
12 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/003. 8.2 Network Access Control List and Firewalling.mp4
26 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/004. 8.3 VLAN ACLs, Security Group Based ACLs, Downloadable ACLs.en.srt
6.6 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/004. 8.3 VLAN ACLs, Security Group Based ACLs, Downloadable ACLs.mp4
16 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/005. 8.4 Cisco Identity Services Engine (ISE).en.srt
6.0 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/005. 8.4 Cisco Identity Services Engine (ISE).mp4
14 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/006. 8.5 Cisco Platform Exchange Grid (pxGrid).en.srt
9.7 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/006. 8.5 Cisco Platform Exchange Grid (pxGrid).mp4
29 MB
Lesson 8 Secure Network Access, Visibility, and Enforcement/007. 8.6 Cisco ISE Context and Identity Services; Profiling Services; and Authorization Rules.en.srt
11 kB
Lesson 8 Secure Network Access, Visibility, and Enforcement/007. 8.6 Cisco ISE Context and Identity Services; Profiling Services; and Authorization Rules.mp4
29 MB
Lesson 9 Preparing for the Exam/001. Learning objectives.en.srt
359 B
Lesson 9 Preparing for the Exam/001. Learning objectives.mp4
2.1 MB
Lesson 9 Preparing for the Exam/002. 9.1 Final Tips for Exam Day.en.srt
3.6 kB
Lesson 9 Preparing for the Exam/002. 9.1 Final Tips for Exam Day.mp4
18 MB
Lesson 9 Preparing for the Exam/003. 9.2 Where to go now.en.srt
4.3 kB
Lesson 9 Preparing for the Exam/003. 9.2 Where to go now.mp4
13 MB
Summary/001. CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Summary.en.srt
1.8 kB
Summary/001. CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) Summary.mp4
9.8 MB