TorBT - Torrents and Magnet Links Search Engine
CCNA Security (210-260) Cert Prep - 6 Intrusion Prevention
- Date: 2022-01-22
- Size: 202 MB
- Files: 54
File Name
Size
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4
16 MB
1.Introduction/01.Welcome.mp4
4.8 MB
1.Introduction/02.What you need to know.en.srt
1.2 kB
1.Introduction/02.What you need to know.mp4
2.0 MB
1.Introduction/03.Packet Tracer and exercise files.en.srt
1.0 kB
1.Introduction/03.Packet Tracer and exercise files.mp4
3.2 MB
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt
895 B
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4
1.8 MB
2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt
4.1 kB
2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4
7.4 MB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt
4.7 kB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4
10 MB
2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt
4.0 kB
2.1. IDS and IPS Overview/07.IPS versus IDS.mp4
6.6 MB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt
6.5 kB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4
11 MB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt
4.0 kB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4
7.1 MB
3.2. Detection and Signature Engines/10.Monitoring the network.en.srt
4.3 kB
3.2. Detection and Signature Engines/10.Monitoring the network.mp4
10 MB
3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt
6.4 kB
3.2. Detection and Signature Engines/11.Signature-based IDS.mp4
12 MB
3.2. Detection and Signature Engines/12.Sweep scan.en.srt
4.3 kB
3.2. Detection and Signature Engines/12.Sweep scan.mp4
10 MB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt
5.2 kB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4
9.1 MB
3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt
3.1 kB
3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4
5.1 MB
3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt
4.4 kB
3.2. Detection and Signature Engines/15.Policy-based IDS.mp4
6.6 MB
4.3. Decisions and Actions/16.IDS signature files.en.srt
3.9 kB
4.3. Decisions and Actions/16.IDS signature files.mp4
6.3 MB
4.3. Decisions and Actions/17.Trigger actions and responses.en.srt
5.8 kB
4.3. Decisions and Actions/17.Trigger actions and responses.mp4
9.2 MB
4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt
5.3 kB
4.3. Decisions and Actions/18.Blacklist and whitelist.mp4
9.5 MB
4.3. Decisions and Actions/19.Managing IPS alarms.en.srt
3.4 kB
4.3. Decisions and Actions/19.Managing IPS alarms.mp4
5.6 MB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt
5.3 kB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4
11 MB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt
3.8 kB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4
7.0 MB
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt
5.2 kB
1.Introduction/01.Welcome.en.srt
1.2 kB
6.5. Practical Applications/23.Monitoring and analyzing.en.srt
3.9 kB
6.5. Practical Applications/23.Monitoring and analyzing.mp4
6.3 MB
6.5. Practical Applications/24.Syslog.en.srt
1.7 kB
6.5. Practical Applications/24.Syslog.mp4
4.8 MB
6.5. Practical Applications/25.Using IDS and honeypots.en.srt
5.9 kB
6.5. Practical Applications/25.Using IDS and honeypots.mp4
10 MB
6.5. Practical Applications/26.The EINSTEIN system.en.srt
3.7 kB
6.5. Practical Applications/26.The EINSTEIN system.mp4
6.4 MB
7.Conclusion/27.Summary.en.srt
1.6 kB
7.Conclusion/27.Summary.mp4
2.7 MB