Torrent Info
Title Pearson (Pearson IT CCNP and CCIE Security Core SCOR 350.701, 2020, ENG)
Category Movies
Size 14.29GB

Movie Info
Pearson
Title Pearson
Year 2019–
Country USA
Category Drama
Director N/A
Actors Gina Torres, Bethany Joy Lenz, Simon Kassianides, Eli Goree
Description Attorney Jessica Pearson enters the complex and seedy world of Chicago politics.
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 - CCNP and CCIE Security Core SCOR 350-701 - Introduction.mp4 92.82MB
002 - Module introduction.mp4 12.37MB
003 - Learning objectives.mp4 45.14MB
004 - 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 393.02MB
005 - 1.2 Keyloggers and Spyware.mp4 65.93MB
006 - 1.3 Malware Analysis Techniques.mp4 105.55MB
007 - 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks.mp4 99.21MB
008 - 1.5 Surveying Common Application-based Vulnerabilities.mp4 170.42MB
009 - 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities.mp4 223.17MB
010 - 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 567.76MB
011 - 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 627.72MB
012 - 1.9 Understanding Buffer Overflows.mp4 169.00MB
013 - 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 104.30MB
014 - 1.11 Understanding Security Threats in Cloud Environments.mp4 177.78MB
015 - 1.12 Understanding IoT Security Threats.mp4 294.08MB
016 - Learning objectives.mp4 20.74MB
017 - 2.1 Introducing Cryptography and Cryptanalysis.mp4 48.54MB
018 - 2.2 Understanding Encryption Protocols.mp4 120.25MB
019 - 2.3 Describing Hashing Algorithms.mp4 93.67MB
020 - 2.4 Introducing Public Key Infrastructure (PKI).mp4 150.07MB
021 - 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 134.82MB
022 - 2.6 Surveying SSL and TLS Implementations.mp4 133.78MB
023 - 2.7 Surveying IPsec Implementations.mp4 370.66MB
024 - Module introduction.mp4 13.48MB
025 - Learning objectives.mp4 26.01MB
026 - 3.1 Introducing SDN.mp4 124.73MB
027 - 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 86.91MB
028 - 3.3 Introducing Cisco ACI.mp4 150.75MB
029 - 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 195.88MB
030 - 3.5 Understanding VXLAN and Network Overlays.mp4 87.21MB
031 - 3.6 Understanding Microsegmentation.mp4 66.69MB
032 - 3.7 Surveying Open Source SDN Solutions.mp4 78.69MB
033 - 3.8 Understanding the Threats Against SDN Solutions.mp4 66.28MB
034 - 3.9 Understanding the Security Benefits in SDN Solutions.mp4 62.50MB
035 - Learning objectives.mp4 31.93MB
036 - 4.1 Introducing Network Programmability.mp4 272.55MB
037 - 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 35.82MB
038 - 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 343.94MB
039 - 4.4 A Brief Introduction to Git.mp4 190.97MB
040 - 4.5 Exploring pxGrid.mp4 140.43MB
041 - 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 92.26MB
042 - Module introduction.mp4 14.83MB
043 - Learning objectives.mp4 30.20MB
044 - 5.1 Understanding Authentication.mp4 236.79MB
045 - 5.2 Exploring the RADIUS Protocol.mp4 91.65MB
046 - 5.3 Surveying the TACACS+ Protocol.mp4 62.30MB
047 - 5.4 Understanding Authorization.mp4 68.73MB
048 - 5.5 Surveying Authorization Models.mp4 135.98MB
049 - 5.6 Defining Accounting.mp4 54.33MB
050 - 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 200.74MB
051 - 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 55.54MB
052 - 5.9 Understanding Cisco DUO.mp4 92.88MB
053 - 5.10 Introducing Cisco ISE.mp4 106.68MB
054 - 5.11 Understanding Cisco ISE Profiling Services.mp4 57.10MB
055 - 5.12 Understanding ISE Identity Services.mp4 93.33MB
056 - 5.13 Describing ISE Authorization Rules.mp4 76.24MB
057 - Learning objectives.mp4 48.24MB
058 - 6.1 Defining Network Visibility and Segmentation.mp4 50.85MB
059 - 6.2 Introducing NetFlow and IPFIX.mp4 56.42MB
060 - 6.3 Describing Flexible NetFlow Records.mp4 92.08MB
061 - 6.4 Understanding NetFlow Deployment.mp4 99.49MB
062 - 6.5 Exploring Cisco Stealthwatch.mp4 41.38MB
063 - 6.6 Deploying Cisco Stealthwatch Cloud.mp4 61.91MB
064 - 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 21.92MB
065 - 6.8 Exploring the Cisco TrustSec Solution.mp4 86.27MB
066 - 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 42.91MB
067 - 6.10 Introducing Network Segmentation.mp4 45.95MB
068 - 6.11 Exploring Application-based Segmentation.mp4 46.15MB
069 - 6.12 Understanding Cisco ACI.mp4 56.44MB
070 - 6.13 Describing Network Access with CoA.mp4 41.18MB
071 - 6.14 Integrating Different Security Systems Using pxGrid.mp4 89.01MB
072 - 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid.mp4 156.58MB
073 - Module introduction.mp4 16.36MB
074 - Learning objectives.mp4 29.66MB
075 - 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 101.45MB
076 - 7.2 Configuring and Verifying Port Security.mp4 102.06MB
077 - 7.3 Configuring and Verifying DHCP Snooping.mp4 96.69MB
078 - 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 120.12MB
079 - 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 145.70MB
080 - 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 55.26MB
081 - 7.7 Understanding and Configuring CDP_LLDP.mp4 76.95MB
082 - 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 118.65MB
083 - 7.9 Exploring How to Secure the Management Plane.mp4 113.37MB
084 - 7.10 Exploring How to Secure the Control Plane.mp4 112.54MB
085 - 7.11 Exploring How to Secure the Data Plane.mp4 99.97MB
086 - Learning objectives.mp4 39.01MB
087 - 8.1 Introducing Cisco Next-Generation Firewalls.mp4 129.00MB
088 - 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 370.40MB
089 - 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 198.77MB
090 - 8.4 Implementing Access Control Policies.mp4 50.91MB
091 - Learning objectives.mp4 16.11MB
092 - 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 175.52MB
093 - 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities.mp4 55.86MB
094 - 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 120.95MB
095 - Module introduction.mp4 11.46MB
096 - Learning objectives.mp4 18.75MB
097 - 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 121.61MB
098 - 10.2 Configuring IPsec Site-to-site VPNs.mp4 37.68MB
099 - 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 77.94MB
100 - 10.4 Exploring DMVPN.mp4 147.43MB
101 - 10.5 Understanding GET VPN.mp4 121.26MB
102 - 10.6 Deploying FlexVPN.mp4 161.16MB
103 - 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 98.84MB
104 - Learning objectives.mp4 22.05MB
105 - 11.1 Introducing Remote Access VPNs.mp4 26.98MB
106 - 11.2 Exploring Clientless Remote Access VPNs.mp4 98.54MB
107 - 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 88.25MB
108 - 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 111.05MB
109 - 11.5 Troubleshooting Remote Access VPN Implementations.mp4 36.14MB
110 - Module introduction.mp4 17.25MB
111 - Learning objectives.mp4 31.03MB
112 - 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 97.42MB
113 - 12.2 Surveying Patch Management in the Cloud.mp4 58.88MB
114 - 12.3 Performing Security Assessments in Cloud Environments.mp4 101.26MB
115 - 12.4 Introducing Agile, DevOps, and CI_CD Pipelines.mp4 193.03MB
116 - 12.5 Introducing Serverless Computing.mp4 28.78MB
117 - 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 47.52MB
118 - 12.7 Exploring the Concepts of DevSecOps.mp4 106.53MB
119 - 12.8 Surveying Cisco Umbrella.mp4 118.51MB
120 - 12.9 Exploring Cisco Cloud Email Security.mp4 43.33MB
121 - 12.10 Exploring Cisco Cloudlock.mp4 102.30MB
122 - Learning objectives.mp4 35.34MB
123 - 13.1 Introducing Cisco Content Security Solutions.mp4 100.28MB
124 - 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 71.42MB
125 - 13.3 Introduction to Cisco Email Security.mp4 111.05MB
126 - 13.4 Exploring the Cisco ESA Deployment Model.mp4 36.87MB
127 - 13.5 Understanding Email Security Features.mp4 73.96MB
128 - 13.6 Discussing Email Security in the Cloud.mp4 72.92MB
129 - 13.7 Introduction to Secure Internet Gateway (SIG).mp4 50.34MB
130 - 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 83.44MB
131 - 13.9 Exploring Cisco Umbrella Investigate.mp4 93.94MB
132 - Module introduction.mp4 9.83MB
133 - Learning objectives.mp4 43.81MB
134 - 14.1 Introducing AMP for Endpoints.mp4 63.03MB
135 - 14.2 Describing AMP for Endpoints Outbreak Control.mp4 132.04MB
136 - 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 61.84MB
137 - 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 53.04MB
138 - 14.5 Exploring Application Control in AMP for Endpoints.mp4 34.02MB
139 - 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 92.83MB
140 - 14.7 Introduction to AMP for Endpoints Policies.mp4 12.49MB
141 - 14.8 Describing the Anyconnect AMP Enabler.mp4 7.08MB
142 - 14.9 Exploring AMP for Endpoints Engines.mp4 25.35MB
143 - 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 63.13MB
144 - 14.11 Introducing the Cisco Threat Response Solution.mp4 78.40MB
145 - CCNP and CCIE Security Core SCOR 350-701 - Summary.mp4 51.30MB
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent