TorBT - Torrents and Magnet Links Search Engine

CCIE Security v6.0

File Name
Size
1-Introduction/1-Introduction/1-Course Introduction.ts
7.3 MB
1-Introduction/2-Exam Information/1-CCIE Security v6 Exam.ts
81 MB
1-Introduction/3-Study & Preparation Resources/1-Recommended Study Approach.ts
25 MB
1-Introduction/3-Study & Preparation Resources/2-Recommended Reading.ts
107 MB
1-Introduction/3-Study & Preparation Resources/3-Other Resources.ts
59 MB
1-Introduction/4-Lab Strategy/1-Design.ts
40 MB
1-Introduction/4-Lab Strategy/2-Deploy, Operate and Optimize.ts
49 MB
1-Introduction/5-Course Conclusion/1-Course Conclusion.ts
3.9 MB
10-CCIE Security v6 Exam Review/1-Introduction & Overview/1-Course Introduction.ts
43 MB
10-CCIE Security v6 Exam Review/11- Advanced Threat Protection & Content Security/1-Cisco WSA - Part 1.ts
107 MB
10-CCIE Security v6 Exam Review/11- Advanced Threat Protection & Content Security/2-Cisco WSA - Part 2.ts
126 MB
10-CCIE Security v6 Exam Review/11- Advanced Threat Protection & Content Security/3-Cisco ESA.ts
183 MB
10-CCIE Security v6 Exam Review/11- Advanced Threat Protection & Content Security/4-Cisco Umbrella.ts
70 MB
10-CCIE Security v6 Exam Review/12-Infrastructure Security & Automation/1-Securing Management & Control Planes - Part 1.ts
83 MB
10-CCIE Security v6 Exam Review/12-Infrastructure Security & Automation/2-ecuring Management & Control Planes - Part 2.ts
101 MB
10-CCIE Security v6 Exam Review/13-Layer 2/1-Securing Layer 2 - Part 1.ts
82 MB
10-CCIE Security v6 Exam Review/13-Layer 2/2-Securing Layer 2 - Part 2.ts
84 MB
10-CCIE Security v6 Exam Review/14-Python & Security/1-Python & Security Automation - Part 1.ts
73 MB
10-CCIE Security v6 Exam Review/14-Python & Security/2-Python & Security Automation - Part 2.ts
109 MB
10-CCIE Security v6 Exam Review/2-Perimeter Security & Intrusion Prevention/ASA/1-Basic ASA Concepts - Part 1.ts
72 MB
10-CCIE Security v6 Exam Review/2-Perimeter Security & Intrusion Prevention/ASA/2-Basic ASA Concepts - Part 2.ts
76 MB
10-CCIE Security v6 Exam Review/2-Perimeter Security & Intrusion Prevention/ASA/3-ASA Modes.ts
167 MB
10-CCIE Security v6 Exam Review/3-NAT/1-Policies, Inspections & NAT - Part 1.ts
123 MB
10-CCIE Security v6 Exam Review/3-NAT/2-Policies, Inspections & NAT - Part 2.ts
60 MB
10-CCIE Security v6 Exam Review/4-High Availability/1-High Availability.ts
75 MB
10-CCIE Security v6 Exam Review/5-IOS Zone-Based Firewall/1-IOS Zone-Based Firewall.ts
123 MB
10-CCIE Security v6 Exam Review/6-FTD/1-FTD Basics & Modes.ts
134 MB
10-CCIE Security v6 Exam Review/6-FTD/2-FTD Policies - Part 1.ts
131 MB
10-CCIE Security v6 Exam Review/6-FTD/3-FTD Policies - Part 2.ts
128 MB
10-CCIE Security v6 Exam Review/7-Intrusion Prevention & NGIPS/1-Intrusion Prevention & NGIPS.ts
92 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/1-Introduction to VPNs - Part 1.ts
82 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/2-Introduction to VPNs - Part 2.ts
83 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/3-PKI & FlexVPN - Part 1.ts
152 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/4-PKI & FlexVPN - Part 2.ts
107 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/5-Remote Access.ts
110 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/6-DMVPN - Part 1.ts
92 MB
10-CCIE Security v6 Exam Review/8-Secure Connectivity/7-DMVPN - Part 2.ts
108 MB
10-CCIE Security v6 Exam Review/9-Identity Management & Access Control/ISE/1-ISE Fundamentals & Policies.ts
132 MB
10-CCIE Security v6 Exam Review/9-Identity Management & Access Control/ISE/2-AAA & Device Administration.ts
147 MB
10-CCIE Security v6 Exam Review/9-Identity Management & Access Control/Wireless/1-802.1x for Wired & Wireless Networks - Part 1.ts
142 MB
10-CCIE Security v6 Exam Review/9-Identity Management & Access Control/Wireless/2-802.1x for Wired & Wireless Networks - Part 2.ts
107 MB
10-CCIE Security v6 Exam Review/ine-ccie-scv6-exam-review-files.zip
40 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/1-Introdution/1-Course Introduction.ts
6.4 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/2-Introduction to Ethernet/1-Ethernet.ts
52 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/3-LAN Fundamentals/1-LAN Switching Concepts.ts
33 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/3-LAN Fundamentals/2-VLANs & Trunking.ts
149 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/3-LAN Fundamentals/3-VLAN Trunking Protocol (VTP).ts
128 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/4-Spanning Tree Protocol/1-Spanning Tree Protocol (STP).ts
144 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/4-Spanning Tree Protocol/2-Optional STP Features.ts
72 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/4-Spanning Tree Protocol/3-Optional STP Features.ts
94 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/5-Advanced LAN Concepts/1-EtherChannel.ts
102 MB
2-Routing & Switching Technologies Review/1-Layer 2 Technologies for Beginners/5-Advanced LAN Concepts/2-Switch Stacking, Chassis Aggregation.ts
24 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/1-Introduction/1-Course Introduction.ts
5.5 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/2-Introduction to IP Routing/1-IP Routing.ts
137 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/1-The RIPv2 Protocol.ts
109 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/2-The EIGRP Protocol.ts
202 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/3-The EIGRPv6 Protocol.ts
83 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/4-The OSPF Protocol.ts
223 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/5-The OSPFv3 Protocol.ts
97 MB
2-Routing & Switching Technologies Review/2-Routing Technologies for Beginners/3-Routing Protocols/6-The BGP Protocol.ts
97 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/1-Course Overview/1-Course Introduction.ts
53 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/1-Course Overview/2-IOS Router Planes.ts
36 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/1-Access Lists Overview.ts
42 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/10-Access Lists Logging.ts
124 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/11-Access Lists Troubleshooting.ts
76 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/2-Standard Access Lists.ts
58 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/3-Extended Access Lists - Implementation & Considerations.ts
109 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/4-Extended Access Lists - IPv6 Neighbor Discovery.ts
121 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/5-Time Based Access Lists.ts
52 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/6-Dynamic Access Lists - Overview.ts
86 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/7-Dynamic Access Lists - Per-User.ts
52 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/8-Reflexive Access Lists.ts
124 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/2-Access Lists/9-Access Lists Object-Groups.ts
52 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/1-DoS & DDoS Attacks - Overview.ts
63 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/10-Source Based RTBH.ts
64 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/11-ICMP Attacks - Overview.ts
76 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/12-ICMP Attacks - Mitigation.ts
82 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/13-UDP Attacks.ts
100 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/14-TCP Attacks.ts
100 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/15-TCP Intercept - Overview.ts
86 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/16-TCP Intercept - Overview.ts
126 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/17-Fragmentation Attacks - Overview.ts
83 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/18-Fragmentation Attacks - Overview.ts
144 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/19-Fragmentation Attack Protection with ACL.ts
117 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/2-DoS & DDoS Attacks - Cisco's Guide to DDoS Defense.ts
108 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/20-Frangment Filtering via ACL.ts
139 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/21-Virtual Fragmentation Reassembly (VFR) - Implementation.ts
95 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/21-Virtual Fragmentation Reassembly (VFR) - Overview.ts
61 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/3-DoS & DDoS Attacks - Evolution.ts
81 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/4-IP Address Spoofing.ts
126 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/5-Unicast RPF.ts
86 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/6-Strict uRPF.ts
96 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/7-Advanced uRPF.ts
58 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/8-uRPF Troubleshooting.ts
54 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/3-DoS & DDoS Mitigation/9-Remotely Triggered Black Hole Filtering (RTBH).ts
129 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/1-ZBFW - Overview.ts
105 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/10-ZBFW ICMP Inspection.ts
118 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/11-Tuning TCP Connection Settings.ts
86 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/12-ZBFW TCP Reset Segment Control.ts
19 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/13-ZBFW TCP Window Scaling.ts
32 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/14-ZBFW Tuning UDP & ICMP Connection Settings.ts
45 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/15-ZBFW with ACL.ts
66 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/2-ZBFW Building Blocks - Command Syntax.ts
79 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/3-ZBFW Building Blocks - Layer 3-4 Policy-Maps.ts
97 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/4-ZBFW Basic Policy Implementation - Overview.ts
110 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/5-ZBFW Basic Policy Implementation - Configuration.ts
137 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/6-ZBFW Traffic Policing.ts
48 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/7-ZBFW TCP Inspection.ts
78 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/8-ZBFW TCP OoO Packet.ts
66 MB
3-Perimeter Security and Intrusion Prevention/1-IOS Firewall/4-Zone Based Policy Firewall/9-ZBFW UDP Inspection.ts
84 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/1-Overview/1-Course Introduction.ts
15 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/10-Failover/1-Active-Standby & Active-Active.ts
30 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/11-Clustering/1-Clustering.ts
59 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/2-Basic Setup on ASA/1-Configuring IP Addressing on ASA.ts
5.3 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/2-Basic Setup on ASA/2-Configuring Nameif & Security Levels on ASA.ts
7.5 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/3-Routing Protocol/1-Configuring Static Routes on ASA.ts
11 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/3-Routing Protocol/2-Configuring EIGRP on ASA.ts
17 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/3-Routing Protocol/3-Control Plane Authentication in EIGRP.ts
16 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/3-Routing Protocol/4-Configuring OSPF on ASA.ts
18 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/3-Routing Protocol/5-Control Plane Authentication in OSPF.ts
21 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/4-Management Access Setup/1-Management Access to ASA.ts
15 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/5-ACL, Objects & Object-Groups/1-Configuring Objects, Object-Group & ACL.ts
34 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/6-NAT/1-Configuring Dynamic NAT.ts
47 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/6-NAT/2-Configuring Dynamic PAT.ts
13 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/6-NAT/3-Configuring Static NAT & Static PAT.ts
24 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/6-NAT/4-Configuring Twice NAT.ts
16 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/7-Policy Maps & Class Maps/1-BGP Through ASA.ts
31 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/8-Transparent Firewall/1-Bridging Vlans using Transparent ASA.ts
17 MB
3-Perimeter Security and Intrusion Prevention/2-ASA Firewall/9-Multi-Context/1-Creating Virtual Firewalls.ts
37 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/1-Introduction/1-Instructor Introduction.ts
3.0 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/1-Firewall Technologies.ts
48 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/2-Access Lists.ts
114 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/3-Zone-Based Firewall (ZFW).ts
70 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/4-Implementing ZFW.ts
73 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/5-IOS Network Address Translation (NAT).ts
92 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/2-IOS Firewall Technologies/6-NAT for IPv6.ts
128 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/1-Cisco ASA Firewall Fundamentals.ts
35 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/10-Traffic Filtering & Control.ts
25 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/11-Implementing Traffic Filtering.ts
61 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/12-ASA Network Address Translation (NAT).ts
62 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/13-ASA Network Address Translation (NAT).ts
70 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/2-Redundant Interfaces.ts
49 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/3-EtherChannels.ts
17 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/4-ASA Routing Overview.ts
50 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/5-ASA Routing - EIGRP.ts
23 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/6-ASA Routing - EIGRP.ts
52 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/7-ASA Routing - BGP.ts
34 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/8-ASA Management.ts
19 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/3-Basic ASA Technologies/9-Implementing Management Access.ts
30 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/1-ASA Modes of Operations.ts
35 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/10-Clustering - Basic Operations.ts
36 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/11-Clustering - Deployment Modes.ts
37 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/12-Implementing L3 Clustering.ts
110 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/13-Implementing L2 Clustering.ts
104 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/2-Implementing Transparent ASA.ts
83 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/3-Implementing Security Contexts.ts
69 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/4-Modular Policy Framework (MPF) Overview.ts
35 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/5-Implementing MPF.ts
88 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/6-ASA High Availability - Failover.ts
17 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/7-Failover - Active Standby.ts
81 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/8-Failover - Active Active.ts
83 MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/9-Clustering Overview.ts
34 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/1-Introduction to Firepower Systems.ts
52 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/2- Managing FTD.ts
69 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/3-The Registration.ts
52 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/4-Troubleshooting FTD.ts
36 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/5-FTD Objects.ts
21 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/6-Deployment Modes.ts
63 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/7-FTD Initialization _ Routing.ts
54 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/8-FTD Policies Overview.ts
41 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/1-Access Control Policy (ACP).ts
99 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/2-Special Policies.ts
116 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/3-Security Intelligence (SI).ts
83 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/4- URL Filtering.ts
70 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/5-Network Discovery.ts
50 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/6-File Policy.ts
75 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/7- SSL Policy.ts
75 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/1-Introduction to Next Generation IPS (NGIPS).ts
24 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/2-Snort Variables _ Rules.ts
75 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/3-Implementing NGIPS.ts
82 MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/ine-ccie-scv5-ftd-next-generation-firewall.zip
6.5 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/1-Firepower Threat Defense/1-Course Introduction.ts
71 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/1-Firepower Threat Defense/2-Packet Flow - Overview.ts
56 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/10-Turning Your System/1-Network Analysis - Part 1.ts
81 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/10-Turning Your System/2-Network Analysis - Part 2.ts
103 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/10-Turning Your System/3-Network Analysis - Part 3.ts
111 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/11-Managing Administrators/1-User Account Managment.ts
58 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/12-Connecting the FMC to Your AD/1-Identity Policy.ts
56 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/2-Firepower Managent Center (FMC)/1-Installing a Cisco Firepower Managent Center (FMC) - Part 1.ts
19 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/2-Firepower Managent Center (FMC)/2-Installing a Cisco Firepower Managent Center (FMC) - Part 2.ts
24 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/3-Configuring the FMC/1-System Configuration.ts
52 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/3-Configuring the FMC/2-Health Policies & Health Alerts.ts
27 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/4-Installing FTD/1-Installing FTD on a Cisco 5500-x - Part 1.ts
65 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/4-Installing FTD/2-Installing FTD on a Cisco 5500-x - Part 2.ts
66 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/5-Cisco FTD 41009300/1-FXOS & Chassis Manager.ts
53 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/6-Firepower Logical Objects/1-Firepower-FTD Objects - Part 1.ts
74 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/6-Firepower Logical Objects/2-Firepower-FTD Objects - Part 2.ts
98 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/1-FTD Interface Configuration - Part 1.ts
50 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/2-FTD Interface Configuration - Part 2.ts
19 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/3-FTD Routing Configuration.ts
45 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/4-FTD Platform Settings.ts
100 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/1-Access Control Policy - Part 1.ts
77 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/2-Access Control Policy - Part 2.ts
80 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/3-Access Control Policy - Part 3.ts
163 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/4-FTD PreFilter.ts
61 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/5-Network Address Translation (NAT).ts
89 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/6-Malware & File Policy.ts
93 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/7-IPS Policy - Part 1.ts
60 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/8-IPS Policy - Part 2.ts
129 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/9-Discovering Users, Hosts & Aplications/1-Firepower Network Discovery.ts
74 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/9-Discovering Users, Hosts & Aplications/2-Reporting & Task Management.ts
77 MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/ine-ccie-scv5-ftd-intermediate-configuration-files.zip
1.3 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/1-Introduction/1-Course Introduction.ts
9.5 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/1-External Authentication with RADIUS - Overview.ts
11 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/2-External Authentication with RADIUS - Configuration.ts
98 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/3-FlexConfig - Overview.ts
52 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/4-FlexConfig - Configuration.ts
129 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/5-High Availability.ts
63 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/1-SSL Policy - Overview.ts
42 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/2-SSL Policy - Configuration.ts
59 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/3-Quality of Service (QoS).ts
22 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/4-Correlation Policy.ts
81 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/4-Virtual Private Networks/1-FTD VPN.ts
22 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/4-Virtual Private Networks/2-Site-to-Site IPsec IKEv1.ts
70 MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/4-Virtual Private Networks/3-Remote Access SSL-TLS.ts
99 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/1-Introduction/1-Course Introduction.TS
34 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/1-Introduction to Cryptography.TS
37 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/2-Hashing.TS
42 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/3-Symmetric Encryption.TS
51 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/4- Asymmetric Encryption.TS
30 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/5-Digital Signatures.TS
26 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/2-Cryptography/6-Next Generation Encryption.TS
48 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/3-Public Key Infrastructure (PKI)/1- Public Key Infrastructure.TS
46 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/3-Public Key Infrastructure (PKI)/2- Enrollment _ Revocation.TS
33 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/3-Public Key Infrastructure (PKI)/3-PKI Architectures.TS
28 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/3-Public Key Infrastructure (PKI)/4-Implementing PKI.TS
110 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/3-Public Key Infrastructure (PKI)/5-ASA _ PKI.TS
42 MB
4-Cryptography and Virtual Private Networks/1-Cryptography&PKI/ine-ccie-scv5-cryptography-course-files.zip
3.1 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/1-Overview/1-Course Introduction.TS
9.7 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/2-Virtual Private Networks/1-VPNs, Tunneling _ GRE.TS
60 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/3-IKEv1 _ IPsec Fundamentals/1-IPsec Overview.TS
67 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/3-IKEv1 _ IPsec Fundamentals/2- IPsec Tunneling.TS
27 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/3-IKEv1 _ IPsec Fundamentals/3-IPsec on the ASA.TS
45 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/3-IKEv1 _ IPsec Fundamentals/4-Implementing L2L IPsec VPN - IOS-ASA.TS
72 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/4-IPsec Advanced/1- IOS Advanced IPsec Solutions.TS
88 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/4-IPsec Advanced/2-IPsec _ IPv6.TS
25 MB
4-Cryptography and Virtual Private Networks/2-IKEv1 IPsec VPN/ine-ccie-scv5-ikev1-ipsec-vpn-course-files.zip
1.9 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/1-Course Overview/1-Course Introduction.ts
11 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/1-DMVPN - Overview.ts
32 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/10-Implementing IPv6 DMVPN.ts
79 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/11-DMVPN Dual Hub.ts
38 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/12-Implementing DMVPN Dual Hub.ts
77 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/2-DMVPN - Routing.ts
53 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/3-DMVPN - Phase I.ts
45 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/4-Implementing DMVPN - Phase I.ts
155 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/5-DMVPN - Phase II.ts
35 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/6-Implementing DMVPN - Phase II.ts
100 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/7-DMVPN - Phase III.ts
49 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/8-Implementing DMVPN - Phase III.ts
49 MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/2-Dynamic Multipoint VPN (DMVPN)/9-DMVPN & IPv6.ts
18 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/1-Overview/1-Course Introduction.ts
12 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/2-GETVPN Basics/1-GETVPN Overview.ts
45 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/2-GETVPN Basics/2-Implementing GETVPN.ts
132 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/2-GETVPN Basics/3-GETVPN for IPv6.ts
92 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/3-GETVPN Advanced/1-COOP KS.ts
160 MB
4-Cryptography and Virtual Private Networks/4-Group Encrypted Transport VPN (GETVPN)/3-GETVPN Advanced/2-G-IKEv2.ts
118 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/1-Cryptography _ Public Key Infrastructure/1-Cryptography Basics.ts
80 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/1-Cryptography _ Public Key Infrastructure/2-Public Key Infrastructure (PKI).ts
105 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/1-Cryptography _ Public Key Infrastructure/3-PKI Configuration.ts
108 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/1-Virtual Private Network (VPN) & IPsec.ts
123 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/2-IPsec on the ASA.ts
38 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/3-IPsec VPN - L2L IOS-ASA.ts
210 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/4-IPsec VPN - L2L Digital Certificates.ts
166 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/5-ASA Certificate Maps.ts
84 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/6-IOS Advanced IPsec Solutions.ts
206 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/7-IPsec for IPv6.ts
192 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/2-Virtual Private Networks _ IP Security/8-VRF-Aware IPsec.ts
113 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/3-IKE version 2/1-IKE Version 2 Overview.ts
40 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/3-IKE version 2/2-Cisco FlexVPN.ts
176 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/3-IKE version 2/3-IKEv2 IPsec VPN L2L IOS-ASA missing.txt
0 B
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/3-IKE version 2/4-Cisco FlexVPN - Client-Server.ts
218 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/1-The SSL & TLS Protocols.ts
55 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/2-Remote Access VPN - SSL-TLS.ts
42 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/3-Cisco AnyConnect.ts
9.0 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/4-ASA Clientless SSL VPN.ts
54 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/5-ASA AnyConnect SSL VPN.ts
54 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/4-SSLTLS VPNs/6-IOS SSL VPN.ts
62 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/1-Introduction to DMVPN.ts
100 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/2-Implementing DMVPN.ts
252 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/3-DMVPN for IPv6.ts
233 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/5-Dynamic Multipoint VPN/4-DMVPN - Dual Hub.ts
28 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/6-Group Encrypted Transport VPN/1-Introduction to GETVPN.ts
72 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/6-Group Encrypted Transport VPN/2-Implementing GETVPN.ts
156 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/6-Group Encrypted Transport VPN/3-GETVPN for IPv6.ts
72 MB
4-Cryptography and Virtual Private Networks/5-Secure Connectivity/6-Group Encrypted Transport VPN/4-GETVPN - G-IKEv2.ts
86 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/1-Overview/1-Course Introduction.ts
5.5 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/2-Secure Network Management/1-Securing Administrative Access - Part 1.ts
78 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/2-Secure Network Management/2-Securing Administrative Access - Part 2.ts
50 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/2-Secure Network Management/3-Role-Based CLI Access.ts
79 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/2-Secure Network Management/4-Logging.ts
56 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/3-Hardening Management Protocols/1-Securing SNMP.ts
80 MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/3-Hardening Management Protocols/2-Securing NTP.ts
97 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/1-Overview/1- Course Introduction.TS
5.1 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/2-Routing Protocol Security Basics/1- Routing Protocol Authentication.TS
45 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/3-Routing Protocol Hardening/1-Securing EIGRP.TS
98 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/3-Routing Protocol Hardening/2-Securing OSPF.TS
107 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/3-Routing Protocol Hardening/3-Securing BGP.TS
82 MB
5-Infrastructure Security, Attacks and Mitigation/2-Routing Protocol Security/ine-ccie-scv5-routing-protocol-sc-course-files.zip
1.9 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/1-Introduction/1-Course Introduction.TS
6.5 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/2-L2 Attacks _ Mitigation/1-Securing Switching.TS
97 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/2-L2 Attacks _ Mitigation/2-Protecting STP.TS
46 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/2-L2 Attacks _ Mitigation/3-Securing DHCP.TS
91 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/2-L2 Attacks _ Mitigation/4-Preventing Spoofing.TS
94 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/3-L2 Security Features/1-Private VLANs.TS
94 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/3-L2 Security Features/2-Port-based Traffic Control.TS
43 MB
5-Infrastructure Security, Attacks and Mitigation/3-Layer 2 Security/ine-ccie-scv5-layer2-security-course-files.zip
888 kB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/1-Introduction/1-Instructor Introduction.ts
3.0 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/1-Network Device Architecture.ts
18 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/2-Routing Protocol Authentication.ts
33 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/3-Implementing Routing Protocol Authentication.ts
48 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/4-Route Filtering.ts
24 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/5-Control Plane Policing.ts
63 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/6-Control Plane Protection.ts
38 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/7-Implementing Control Plane Protection.ts
58 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/8-Basic CPU Protection Mechanisms.ts
31 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/9-Basic Memory Protection Mechanisms 2017.ts
19 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/1-Secure Network Management.ts
114 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/2-Management Plane Protection.ts
9.6 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/3-SNMP, NTP & Logging.ts
172 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/4-The DHCP Protocol.ts
46 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/5-DHCPv6.ts
21 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/6-The DNS Protocol.ts
54 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/1-IP Spoofing Attacks.ts
21 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/10-IP Fragmentation.ts
26 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/11-IP Fragmentation - Attack Mitigation.ts
26 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/12-NBAR & NBAR2.ts
68 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/2-Mitigation Tools ACLs.ts
114 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/3-Mitigation Tools URPF.ts
93 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/4-DoS Attacks.ts
20 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/5-Mitigation Tools - TCP Intercept.ts
61 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/6-Mitigation Tools - Policing.ts
22 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/7-Mitigation Tools - RTBH.ts
82 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/8-IP Options & Security.ts
19 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/4-Network Attacks _ Mitigation/9-IP Options - Attack Mitigation.ts
35 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/1-IPv6 Extension Headers.ts
18 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/10-SEND Configuration.ts
120 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/2-Extension Headers Processing & Security.ts
22 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/3-Extension Headers - Attacks Mitigation.ts
87 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/4-IPv6 Fragmentation.ts
38 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/5-IPv6 Fragmentation Attacks Mitigation.ts
75 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/6-Neighbor Discovery.ts
23 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/7-Neighbor Discovery Messages.ts
51 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/8-Secure Neighbor Discovery (SEND) Introduction.ts
28 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/5-Securing IPv6/9-SEND Operations.ts
43 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/1-Discovery Protocols.ts
92 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/2-VLANs & Trunking.ts
52 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/3-Spanning Tree Protocol (STP).ts
77 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/4-STP Security Features - Part I.ts
72 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/5-STP Security Features - Part II.ts
72 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/6-Layer 2 Security - Part I.ts
138 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/7-Layer 2 Security - Part II.ts
131 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/8-Private VLANs & Protected Ports.ts
58 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/9-Storm Control.ts
13 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/7-Securing Wireless Networks/1-Wireless Basics.ts
42 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/7-Securing Wireless Networks/2-Wireless Security.ts
52 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/1-Device Hardening - ASA.ts
21 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/2-Device Hardening - IOS.ts
32 MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/3-Cisco SAFE.ts
47 MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/1-IPv6 First Hop Security - Part 1.ts
221 MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/2-IPv6 First Hop Security - Part 2.ts
287 MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/3-IPv6 First Hop Security - Part 3.ts
104 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/1-Stealthwatch Introduction/1-Introduction to Stealthwatch.ts
79 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/1-Stealthwatch Introduction/2-Basic Stealthwatch System Installation - Part 1.ts
100 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/1-Stealthwatch Introduction/3-Basic Stealthwatch System Installation - Part 2.ts
81 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/2-Understanding SMC/1-SMC Configuration.ts
84 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/3-Classifying Known and Unknown Network Entities/1-Host Groups and User Management.ts
88 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/3-Classifying Known and Unknown Network Entities/2-Classification of Customer Environment.ts
64 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/4-Security and System Maintenance/1-Detecting Indicators of Compromise (IoC) - Part 1.ts
53 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/4-Security and System Maintenance/2-Detecting Indicators of Compromise (IoC) - Part 2.ts
59 MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/4-Security and System Maintenance/3-SNMP, Storage, Backup & Upgrade.ts
105 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/1-Introduction/1-Course Introduction.ts
6.6 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/2-ISE Basics/1-Introduction to Cisco ISE.ts
85 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/2-ISE Basics/2-The Policies.ts
140 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/2-ISE Basics/3-Integrating with Active Directory.ts
10 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/1-Authentication, Authorization _ Accounting (AAA) Overview.ts
47 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/2-AAA Components _ Configuration.ts
91 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/3-Introduction to Cisco Access Control Server (ACS).ts
88 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/4-Introduction to Cisco Identity Services Engine (ISE).ts
42 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/5- AD Integration.ts
17 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/6-ISE Policies.ts
94 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/7-Administrative Access - ISE.ts
161 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/8-Administrative Access - ACS.ts
75 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/main/1-AAA Overview.ts
37 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/main/2-AAA Components & Configuration.ts
90 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/main/3-Controlling Administrative Access.ts
156 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/1-Introduction to Profiling.ts
101 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/2-Change of Authorization (CoA).ts
28 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/3-Profiling Probes.ts
40 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/4-Enabling Profiling.ts
56 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/5-802.ts
62 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/6-802.1x Deployment Modes.ts
35 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/7-Implementing Wired 802.ts
186 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/8-Implementing Wireless 802.ts
62 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/9-Guest Services.ts
31 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/5-Scaling ISE Deployments/1-Distributed ISE.ts
47 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/5-Scaling ISE Deployments/2-Deploying ISE Multinode.ts
52 MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/6-conclusion/1-Course Conclusion.ts
3.5 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/1-course intro/1-Course Introduction.ts
13 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/1-AD Integration.ts
95 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/2-EAP Chaining.ts
146 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/3-Advanced Profiling.ts
261 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/4-Certificate Services.ts
82 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/3-context sharing/1-ISE & WSA - pxGrid.ts
175 MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/3-context sharing/2-ISE & FTD - pxGrid.ts
187 MB
6-Access Control and Identity Services Engine/3-TrustSec/1-Introduction/1-Course Introduction.ts
9.9 MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/1-Introduction to TrustSec.ts
87 MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/2-Classification & SGT.ts
66 MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/3-Propagation & SXP.ts
203 MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/4-Enforcement & SGACL.ts
62 MB
6-Access Control and Identity Services Engine/3-TrustSec/3-Implementing TrustSec/1-TrustSec on IOS.ts
193 MB
6-Access Control and Identity Services Engine/3-TrustSec/3-Implementing TrustSec/2-TrustSec on ASA.ts
107 MB
6-Access Control and Identity Services Engine/3-TrustSec/3-Implementing TrustSec/3-TrustSec for Wireless Networks.ts
47 MB
7-Programmability and Automation/1-Network Programmability Foundation/1-Course Introduction/1-Course Introduction.ts
6.6 MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/1-Introduction to Network Programmability Foundation.ts
60 MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/2-Automation Tools.ts
67 MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/3-Version Control with Git.ts
111 MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/4-Distributed Git and GitHub.ts
36 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/1-introduction to Python.ts
128 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/10-File Access.ts
56 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/11-Classes.ts
54 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/12-Modules and Packages.ts
63 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/2-Basic Python Constructs.ts
109 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/3-Data Types - Numbers.ts
20 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/4-Data Types - Boolean.ts
17 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/5-Data Types - String.ts
126 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/6-Data Types - Dictionary.ts
69 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/7-Conditionals.ts
64 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/8-Loops.ts
53 MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/9-Functions.ts
51 MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/1-Data Formats - JSON.ts
23 MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/2-Data Formats - XML.ts
65 MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/3-Data Formats - YAML.ts
31 MB
7-Programmability and Automation/1-Network Programmability Foundation/5-APIs/1-Introduction to APIs.ts
33 MB
7-Programmability and Automation/1-Network Programmability Foundation/5-APIs/2-API Toolset.ts
86 MB
7-Programmability and Automation/1-Network Programmability Foundation/5-APIs/3-Python Automation with REST API.ts
105 MB
7-Programmability and Automation/1-Network Programmability Foundation/6-Course Conclusion/1-Course Conclusion.ts
3.8 MB
7-Programmability and Automation/1-Network Programmability Foundation/ine-ccie-scv6-network-programmability-foundation-files.zip
33 MB
7-Programmability and Automation/2-cisco DNA/1-The Cisco DNA Architecture.ts
28 MB
7-Programmability and Automation/2-cisco DNA/10-DNAC Workflows, Device Discovery & LAN Automation.ts
58 MB
7-Programmability and Automation/2-cisco DNA/11-ISE Roles & DNAC Communication.ts
24 MB
7-Programmability and Automation/2-cisco DNA/12-ISE Standalone & Distributed Deployment.ts
16 MB
7-Programmability and Automation/2-cisco DNA/13-DNAC & ISE Integration.ts
23 MB
7-Programmability and Automation/2-cisco DNA/2-The Management Layer.ts
22 MB
7-Programmability and Automation/2-cisco DNA/3-Fabric Underlay Design Architecture Guidelines.ts
40 MB
7-Programmability and Automation/2-cisco DNA/4-Network Underlay Best Practices.ts
34 MB
7-Programmability and Automation/2-cisco DNA/5-Design Considerations for SD-Access Fabric Architecture.ts
25 MB
7-Programmability and Automation/2-cisco DNA/6-SD-Access Node Types.ts
39 MB
7-Programmability and Automation/2-cisco DNA/7-Campus Fabric Components.ts
25 MB
7-Programmability and Automation/2-cisco DNA/8-SD-Access Deployment Considerations.ts
43 MB
7-Programmability and Automation/2-cisco DNA/9-Fabric Deployment Models.ts
10 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/1-Introduction/1-Course Introduction.ts
11 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/1-Why Study SD-Access.ts
29 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/2-The 2020 Global Networking Trends Report.ts
23 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/3-The Future of Networking.ts
31 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/1-Introduction to Intent-Based Networking (IBN).ts
33 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/2-IBN in a Nutshell.ts
32 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/3-Demystifying Software Defined-Access.ts
27 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/4-Defining SD-Access.ts
33 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/1-SD-Access & IBN.ts
16 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/2-The What, How, and Why of SD-Access.ts
56 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/3-Why Move to SD-Access.ts
47 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/1-Overview of SD-Access Main Components.ts
15 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/2-Cisco ISE.ts
21 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/3-The Overlay Fabric.ts
17 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/1-Document Repository for SD-Access.ts
51 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/2-Hardware, Software, Licensing & Release Documentation.ts
10 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/3-Exam-Related Documentation.ts
9.9 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/4-How to Study for the CCIE.ts
16 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/1-Introduction to the ISE Role in the SD-Access Architectur.ts
30 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/2-ISE Deployment Models.ts
30 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/3-ISE Integration with SD-Access.ts
24 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/8-Conclusion/1-Course Conclusion.ts
21 MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/ine-ccie-sdaccess-software-defined-fundamentals-files.zip
71 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/1-Overview/1-Course Introduction.ts
7.6 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/1-SMTP.ts
41 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/2-ESA Overview.ts
31 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/3-ESA Initialization - Part 1.ts
64 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/4-ESA Initialization - Part 2.ts
65 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/5-Email Pipeline.ts
36 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/6-Access Tables - Part 1.ts
67 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/7-Access Tables - Part 2.ts
81 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/3-The Policies/1-Introduction to Policies.ts
83 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/3-The Policies/2-ESA Policies - Part 1.ts
138 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/3-The Policies/3-ESA Policies - Part 2.ts
130 MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/4-Advanced ESA Features/1-Message Filters.ts
60 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/1-Overview/1-Course Introduction.ts
6.7 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/1-Overview/2-Introduction to the Web Security Appliance.ts
34 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/10-Time Restrictions & Quotas/1-Advanced Web Security.ts
25 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/11-Integration with ISE/1-PxGrid.ts
12 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/12-Final Words from the Instructor/1-Course Conclusion.ts
3.9 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/2-Connect, Install, & Configure/1-System Setup Wizard.ts
3.8 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/2-Connect, Install, & Configure/2-Web Cache Communication Protocol (WCCP).ts
10 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/3-URL Filtering/1-Blocking Global URL Categories.ts
23 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/3-URL Filtering/2-Blocking Custom URL's.ts
31 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/4-Protocols & User Agents/1-Blocking Custom Browsers.ts
30 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/5-Applications/1-Blocking Applications.ts
16 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/6-Objects/1-Blocking Custom Objects.ts
12 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/7-Command Line Interface/1-WSA CLI.ts
4.2 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/8-High Availability/1-Failover.ts
26 MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/9-Anti-Malware & Reputation/1-Web Reputation.ts
29 MB
8-Content Security and Advanced Threat Protection/3-Content Security/1-Hypertext Transfer Protocol/1-The HTTP Protocol.ts
33 MB
8-Content Security and Advanced Threat Protection/3-Content Security/2-Web Security Appliance Basics/1-Introduction to Cisco Web Security Appliance (WSA).ts
46 MB
8-Content Security and Advanced Threat Protection/3-Content Security/2-Web Security Appliance Basics/2-Initializing WSA.ts
102 MB
8-Content Security and Advanced Threat Protection/3-Content Security/2-Web Security Appliance Basics/3-WSA Modes.ts
113 MB
8-Content Security and Advanced Threat Protection/3-Content Security/3-Web Security Appliance Advanced/1-Identification Profiles.ts
73 MB
8-Content Security and Advanced Threat Protection/3-Content Security/3-Web Security Appliance Advanced/2-Access Policies.ts
145 MB
8-Content Security and Advanced Threat Protection/3-Content Security/3-Web Security Appliance Advanced/3-Decryption Policies.ts
114 MB
8-Content Security and Advanced Threat Protection/3-Content Security/4-Simple Mail Transfer Protocol/1-The SMTP Protocol.ts
41 MB
8-Content Security and Advanced Threat Protection/3-Content Security/5-Email Security Appliance Basics/1-Introduction to Cisco Email Security Appliance (ESA).ts
31 MB
8-Content Security and Advanced Threat Protection/3-Content Security/5-Email Security Appliance Basics/2-ESA Command Line.ts
17 MB
8-Content Security and Advanced Threat Protection/3-Content Security/5-Email Security Appliance Basics/3-The Listener.ts
18 MB
8-Content Security and Advanced Threat Protection/3-Content Security/5-Email Security Appliance Basics/4-ESA Operations.ts
144 MB
8-Content Security and Advanced Threat Protection/3-Content Security/6-Email Security Appliance Advanced/1-ESA Policies Overview.ts
30 MB
8-Content Security and Advanced Threat Protection/3-Content Security/6-Email Security Appliance Advanced/2-Implementing ESA Policies.ts
72 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/1-Introduction/1-Course Introduction.ts
6.7 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/2-AMP Basics/1-Introduction to Advanced Malware Protection.ts
28 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/2-AMP Basics/2-AMP Components & Operations.ts
62 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/3-AMP Integration/1-AMP on FTD.ts
95 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/3-AMP Integration/2-AMP on WSA.ts
113 MB
8-Content Security and Advanced Threat Protection/4-Advanced Malware Protection/3-AMP Integration/3-AMP on ESA.ts
79 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/1-Course Introduction/1-Course Introduction.ts
3.8 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/2-Domain Name System/1-DNS.ts
35 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/3-Umbrella Foundations/1-Introduction to Umbrella.ts
50 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/3-Umbrella Foundations/2-Deploying Umbrella.ts
72 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/4-Policies & Features/1-Introduction to Policies.ts
66 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/4-Policies & Features/2-Working with Policies.ts
86 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/4-Policies & Features/3-Intelligent Proxy.ts
49 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/4-Policies & Features/4-Umbrella Investigate.ts
45 MB
8-Content Security and Advanced Threat Protection/5-Cisco Umbrella/5-Course Conclusion/1-Course Conclusion.ts
3.3 MB
9-Final Preparation V5/1-Introduction/1-CCIE Security lab Bootcamp.ts
90 MB
9-Final Preparation V5/2-ASA/1-VLANS & IP Addressing.ts
58 MB
9-Final Preparation V5/2-ASA/10-Static NAT, Static Policy NAT & Static PAT.ts
246 MB
9-Final Preparation V5/2-ASA/11-Advanced Routing.ts
76 MB
9-Final Preparation V5/2-ASA/12-Twice NAT.ts
122 MB
9-Final Preparation V5/2-ASA/13-Transparent Firewall.ts
266 MB
9-Final Preparation V5/2-ASA/14- ARP Inspection.ts
57 MB
9-Final Preparation V5/2-ASA/15-NTP.ts
67 MB
9-Final Preparation V5/2-ASA/16-HTTP Traffic Inspection.ts
114 MB
9-Final Preparation V5/2-ASA/17-FTP Traffic Inspection.ts
117 MB
9-Final Preparation V5/2-ASA/18-Virtual Firewalls.ts
230 MB
9-Final Preparation V5/2-ASA/19-virtual Firewall Routing - Part 1.ts
21 MB
9-Final Preparation V5/2-ASA/2-Configuring OSPF on ASA.ts
89 MB
9-Final Preparation V5/2-ASA/20-Task 1.19- virtual Firewall Routing - Part 2.ts
61 MB
9-Final Preparation V5/2-ASA/21-Task 1.20- Contexts Classification.ts
132 MB
9-Final Preparation V5/2-ASA/22-Active Standby Failover.ts
128 MB
9-Final Preparation V5/2-ASA/23-Active-Active Failover.ts
50 MB
9-Final Preparation V5/2-ASA/24-Clustering in Multi-Context.ts
231 MB
9-Final Preparation V5/2-ASA/3-Configuring Access-list.ts
224 MB
9-Final Preparation V5/2-ASA/4-Configuring Access-list using Objects-Object-Groups.ts
169 MB
9-Final Preparation V5/2-ASA/5-Administrative Access.ts
100 MB
9-Final Preparation V5/2-ASA/6-ICMP Traffic Protection.ts
31 MB
9-Final Preparation V5/2-ASA/7-Manual Dynamic NAT & PAT.ts
165 MB
9-Final Preparation V5/2-ASA/8- Dynamic Policy NAT & Policy PAT.ts
162 MB
9-Final Preparation V5/2-ASA/9-Auto Dynamic NAT & PAT.ts
153 MB
9-Final Preparation V5/3-FTD and NGIPS/1- IP Addressing on FTD in Routed Mode.ts
135 MB
9-Final Preparation V5/3-FTD and NGIPS/2-Configuring OSPF on FTD.ts
45 MB
9-Final Preparation V5/3-FTD and NGIPS/3-Configuring Access Rules on FTD.ts
162 MB
9-Final Preparation V5/3-FTD and NGIPS/4-Configuring NAT on FTD - Part 2.ts
100 MB
9-Final Preparation V5/3-FTD and NGIPS/5-Security Intelligence - Part 1.ts
77 MB
9-Final Preparation V5/3-FTD and NGIPS/6-Security Intelligence - Part 2.ts
185 MB
9-Final Preparation V5/3-FTD and NGIPS/7-Block download of Malware.ts
37 MB
9-Final Preparation V5/3-FTD and NGIPS/8-FTD in Transparent Mode.ts
93 MB
9-Final Preparation V5/3-FTD and NGIPS/9-NGIPS as Inline.ts
98 MB
9-Final Preparation V5/4-VPN/1-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.ts
92 MB
9-Final Preparation V5/4-VPN/10-DMVPN Phase 1 with IKEv2.ts
176 MB
9-Final Preparation V5/4-VPN/11-DMVPN Phase 2 with IKEv2.ts
69 MB
9-Final Preparation V5/4-VPN/12-DMVPN Phase 3 with IKEv2.ts
51 MB
9-Final Preparation V5/4-VPN/13-Dual Hub Single Cloud DMVPN Phase 3 with IKEv2.ts
74 MB
9-Final Preparation V5/4-VPN/14-GET VPN.ts
404 MB
9-Final Preparation V5/4-VPN/15-FlexVPN.ts
158 MB
9-Final Preparation V5/4-VPN/16-FlexVPN Hardware Client.ts
134 MB
9-Final Preparation V5/4-VPN/17-Clientless SSL VPN.ts
98 MB
9-Final Preparation V5/4-VPN/18-Anyconnect IKEv2.ts
55 MB
9-Final Preparation V5/4-VPN/19-Anyconnect IKEv2.ts
41 MB
9-Final Preparation V5/4-VPN/2-Legacy LAN-to-LAN VPN between IOS Routers using IKEv1.ts
196 MB
9-Final Preparation V5/4-VPN/20-Configure Site-to-Site Certificate-Based VPN.ts
129 MB
9-Final Preparation V5/4-VPN/3- Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.ts
97 MB
9-Final Preparation V5/4-VPN/4-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv1.ts
107 MB
9-Final Preparation V5/4-VPN/5-Legacy LAN-to-LAN VPN between IOS Routers using IKEv2.ts
166 MB
9-Final Preparation V5/4-VPN/6-Legacy LAN-to-LAN VPN between ASA firewalls using IKEv2.ts
80 MB
9-Final Preparation V5/4-VPN/7-Legacy LAN-to-LAN VPN with IKEv1 between IOS and IOS using SVTI.ts
171 MB
9-Final Preparation V5/4-VPN/8-Legacy LAN-to-LAN VPN with IKEv2 between IOS and IOS using SVTI.ts
81 MB
9-Final Preparation V5/4-VPN/9-DMVPN Overview.ts
191 MB
9-Final Preparation V5/5-WSA/1-System Setup.ts
68 MB
9-Final Preparation V5/5-WSA/2-WCCP with WSA.ts
171 MB
9-Final Preparation V5/5-WSA/3-Global Policy on WSA.ts
142 MB
9-Final Preparation V5/5-WSA/4-Custom Blocking on WSA.ts
67 MB
9-Final Preparation V5/5-WSA/5-Custom Blocking on WSA.ts
98 MB
9-Final Preparation V5/6-ISE/1- Admin user creation.ts
32 MB
9-Final Preparation V5/6-ISE/10- PxGrid with WSA.ts
63 MB
9-Final Preparation V5/6-ISE/11- PxGrid with WSA.ts
112 MB
9-Final Preparation V5/6-ISE/12-MAB for AP.ts
161 MB
9-Final Preparation V5/6-ISE/13-MAB for AP.ts
10 MB
9-Final Preparation V5/6-ISE/2-Device login using Radius Protocol.ts
277 MB
9-Final Preparation V5/6-ISE/3-Device authorization using Radius Protocol.ts
57 MB
9-Final Preparation V5/6-ISE/4-Device login using Tacacs.ts
105 MB
9-Final Preparation V5/6-ISE/5-DOT1x for pcA.ts
22 MB
9-Final Preparation V5/6-ISE/6-MAB for IP Phone.ts
341 MB
9-Final Preparation V5/6-ISE/7-Profiling for IP Phone and pcA.ts
105 MB
9-Final Preparation V5/6-ISE/8-Wired Central WebAuth, Employee BYOD, Self and Sponsored Guest.ts
381 MB
9-Final Preparation V5/6-ISE/9- PxGrid with WSA.ts
90 MB
9-Final Preparation V5/7-Troubleshooting/1-Ticket 1.ts
101 MB
9-Final Preparation V5/7-Troubleshooting/2-Ticket 2.ts
169 MB
9-Final Preparation V5/7-Troubleshooting/3-Ticket 3.ts
63 MB
9-Final Preparation V5/7-Troubleshooting/4-Ticket 4.ts
45 MB
9-Final Preparation V5/7-Troubleshooting/5-Ticket 5.ts
77 MB
9-Final Preparation V5/ine-ccie-security-v5-lab-preparation-course-files.zip
688 kB