Torrent Info
Title CCNP and CCIE Security Core SCOR 350-701
Category
Size 1.76GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001. CCNP and CCIE Security Core SCOR 350-701 Introduction.mp4 18.61MB
001. CCNP and CCIE Security Core SCOR 350-701 Introduction en.srt 4.61KB
001. CCNP and CCIE Security Core SCOR 350-701 Summary.mp4 11.21MB
001. CCNP and CCIE Security Core SCOR 350-701 Summary en.srt 2.28KB
001. Learning objectives.mp4 10.04MB
001. Learning objectives.mp4 4.26MB
001. Learning objectives.mp4 5.38MB
001. Learning objectives.mp4 6.70MB
001. Learning objectives.mp4 4.77MB
001. Learning objectives.mp4 7.88MB
001. Learning objectives.mp4 4.74MB
001. Learning objectives.mp4 6.22MB
001. Learning objectives.mp4 2.58MB
001. Learning objectives.mp4 3.76MB
001. Learning objectives.mp4 4.34MB
001. Learning objectives.mp4 6.61MB
001. Learning objectives.mp4 5.55MB
001. Learning objectives.mp4 6.87MB
001. Learning objectives en.srt 2.02KB
001. Learning objectives en.srt 886B
001. Learning objectives en.srt 970B
001. Learning objectives en.srt 1.22KB
001. Learning objectives en.srt 1.34KB
001. Learning objectives en.srt 2.23KB
001. Learning objectives en.srt 1.31KB
001. Learning objectives en.srt 1.76KB
001. Learning objectives en.srt 787B
001. Learning objectives en.srt 729B
001. Learning objectives en.srt 904B
001. Learning objectives en.srt 1.28KB
001. Learning objectives en.srt 1.68KB
001. Learning objectives en.srt 2.03KB
001. Module introduction.mp4 1.83MB
001. Module introduction.mp4 2.05MB
001. Module introduction.mp4 2.27MB
001. Module introduction.mp4 2.46MB
001. Module introduction.mp4 1.68MB
001. Module introduction.mp4 2.50MB
001. Module introduction.mp4 1.46MB
001. Module introduction en.srt 502B
001. Module introduction en.srt 526B
001. Module introduction en.srt 629B
001. Module introduction en.srt 673B
001. Module introduction en.srt 411B
001. Module introduction en.srt 772B
001. Module introduction en.srt 354B
002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits.mp4 41.96MB
002. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits en.srt 21.68KB
002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs.mp4 18.11MB
002. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs en.srt 11.02KB
002. 11.1 Introducing Remote Access VPNs.mp4 3.70MB
002. 11.1 Introducing Remote Access VPNs en.srt 1.97KB
002. 12.1 Introducing the Different Cloud Deployment and Service Models.mp4 11.39MB
002. 12.1 Introducing the Different Cloud Deployment and Service Models en.srt 5.61KB
002. 13.1 Introducing Cisco Content Security Solutions.mp4 10.14MB
002. 13.1 Introducing Cisco Content Security Solutions en.srt 4.23KB
002. 14.1 Introducing AMP for Endpoints.mp4 7.53MB
002. 14.1 Introducing AMP for Endpoints en.srt 3.73KB
002. 2.1 Introducing Cryptography and Cryptanalysis.mp4 5.43MB
002. 2.1 Introducing Cryptography and Cryptanalysis en.srt 2.56KB
002. 3.1 Introducing SDN.mp4 13.80MB
002. 3.1 Introducing SDN en.srt 6.90KB
002. 4.1 Introducing Network Programmability.mp4 31.25MB
002. 4.1 Introducing Network Programmability en.srt 13.35KB
002. 5.1 Understanding Authentication.mp4 30.03MB
002. 5.1 Understanding Authentication en.srt 17.51KB
002. 6.1 Defining Network Visibility and Segmentation.mp4 6.19MB
002. 6.1 Defining Network Visibility and Segmentation en.srt 3.25KB
002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4 12.92MB
002. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt 7.10KB
002. 8.1 Introducing Cisco Next-Generation Firewalls.mp4 17.87MB
002. 8.1 Introducing Cisco Next-Generation Firewalls en.srt 10.40KB
002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems.mp4 28.68MB
002. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems en.srt 7.90KB
003. 1.2 Keyloggers and Spyware.mp4 7.39MB
003. 1.2 Keyloggers and Spyware en.srt 4.41KB
003. 10.2 Configuring IPsec Site-to-site VPNs.mp4 5.59MB
003. 10.2 Configuring IPsec Site-to-site VPNs en.srt 3.78KB
003. 11.2 Exploring Clientless Remote Access VPNs.mp4 12.47MB
003. 11.2 Exploring Clientless Remote Access VPNs en.srt 6.90KB
003. 12.2 Surveying Patch Management in the Cloud.mp4 8.26MB
003. 12.2 Surveying Patch Management in the Cloud en.srt 4.88KB
003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification.mp4 8.25MB
003. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification en.srt 3.83KB
003. 14.2 Describing AMP for Endpoints Outbreak Control.mp4 16.13MB
003. 14.2 Describing AMP for Endpoints Outbreak Control en.srt 8.64KB
003. 2.2 Understanding Encryption Protocols.mp4 13.56MB
003. 2.2 Understanding Encryption Protocols en.srt 7.63KB
003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4 9.64MB
003. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt 3.64KB
003. 4.2 Exploring DevNet and DevNet Resources for Security Automation.mp4 3.80MB
003. 4.2 Exploring DevNet and DevNet Resources for Security Automation en.srt 1.61KB
003. 5.2 Exploring the RADIUS Protocol.mp4 10.29MB
003. 5.2 Exploring the RADIUS Protocol en.srt 5.15KB
003. 6.2 Introducing NetFlow and IPFIX.mp4 6.60MB
003. 6.2 Introducing NetFlow and IPFIX en.srt 3.43KB
003. 7.2 Configuring and Verifying Port Security.mp4 11.89MB
003. 7.2 Configuring and Verifying Port Security en.srt 5.18KB
003. 8.2 Surveying the Cisco Firepower Management Center (FMC).mp4 44.31MB
003. 8.2 Surveying the Cisco Firepower Management Center (FMC) en.srt 18.10KB
003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven.mp4 8.32MB
003. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Preven en.srt 2.37KB
004. 1.3 Malware Analysis Techniques.mp4 11.47MB
004. 1.3 Malware Analysis Techniques en.srt 5.41KB
004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers.mp4 9.94MB
004. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers en.srt 5.23KB
004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client.mp4 9.34MB
004. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client en.srt 4.26KB
004. 12.3 Performing Security Assessments in Cloud Environments.mp4 11.58MB
004. 12.3 Performing Security Assessments in Cloud Environments en.srt 4.63KB
004. 13.3 Introduction to Cisco Email Security.mp4 13.00MB
004. 13.3 Introduction to Cisco Email Security en.srt 4.31KB
004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions.mp4 7.29MB
004. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions en.srt 3.24KB
004. 2.3 Describing Hashing Algorithms.mp4 11.30MB
004. 2.3 Describing Hashing Algorithms en.srt 5.78KB
004. 3.3 Introducing Cisco ACI.mp4 17.68MB
004. 3.3 Introducing Cisco ACI en.srt 9.86KB
004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4 37.47MB
004. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt 16.87KB
004. 5.3 Surveying the TACACS+ Protocol.mp4 7.09MB
004. 5.3 Surveying the TACACS+ Protocol en.srt 3.32KB
004. 6.3 Describing Flexible NetFlow Records.mp4 11.19MB
004. 6.3 Describing Flexible NetFlow Records en.srt 5.55KB
004. 7.3 Configuring and Verifying DHCP Snooping.mp4 11.32MB
004. 7.3 Configuring and Verifying DHCP Snooping en.srt 3.94KB
004. 8.3 Exploring the Cisco Firepower Device Manager (FDM).mp4 23.97MB
004. 8.3 Exploring the Cisco Firepower Device Manager (FDM) en.srt 11.08KB
004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems.mp4 11.89MB
004. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems en.srt 6.48KB
005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.mp4 12.06MB
005. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDo.srt 5.04KB
005. 10.4 Exploring DMVPN.mp4 19.60MB
005. 10.4 Exploring DMVPN en.srt 10.97KB
005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD.mp4 11.97MB
005. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD en.srt 5.11KB
005. 12.4 Introducing Agile, DevOps, and CICD Pipelines.mp4 22.05MB
005. 12.4 Introducing Agile, DevOps, and CICD Pipelines en.srt 12.62KB
005. 13.4 Exploring the Cisco ESA Deployment Model.mp4 5.19MB
005. 13.4 Exploring the Cisco ESA Deployment Model en.srt 2.79KB
005. 14.4 Understanding AMP IP Blacklists and Whitelists.mp4 7.09MB
005. 14.4 Understanding AMP IP Blacklists and Whitelists en.srt 3.73KB
005. 2.4 Introducing Public Key Infrastructure (PKI).mp4 16.74MB
005. 2.4 Introducing Public Key Infrastructure (PKI) en.srt 7.92KB
005. 3.4 Introducing Cisco DNA and Cisco DNA Center.mp4 28.97MB
005. 3.4 Introducing Cisco DNA and Cisco DNA Center en.srt 10.64KB
005. 4.4 A Brief Introduction to Git.mp4 25.27MB
005. 4.4 A Brief Introduction to Git en.srt 10.13KB
005. 5.4 Understanding Authorization.mp4 7.36MB
005. 5.4 Understanding Authorization en.srt 3.38KB
005. 6.4 Understanding NetFlow Deployment.mp4 10.54MB
005. 6.4 Understanding NetFlow Deployment en.srt 3.95KB
005. 7.4 Configuring and Verifying Dynamic ARP Inspection.mp4 15.58MB
005. 7.4 Configuring and Verifying Dynamic ARP Inspection en.srt 7.23KB
005. 8.4 Implementing Access Control Policies.mp4 7.79MB
005. 8.4 Implementing Access Control Policies en.srt 5.55KB
006. 1.5 Surveying Common Application-based Vulnerabilities.mp4 32.64MB
006. 1.5 Surveying Common Application-based Vulnerabilities en.srt 8.64KB
006. 10.5 Understanding GET VPN.mp4 15.68MB
006. 10.5 Understanding GET VPN en.srt 8.36KB
006. 11.5 Troubleshooting Remote Access VPN Implementations.mp4 4.68MB
006. 11.5 Troubleshooting Remote Access VPN Implementations en.srt 2.32KB
006. 12.5 Introducing Serverless Computing.mp4 3.68MB
006. 12.5 Introducing Serverless Computing en.srt 1.86KB
006. 13.5 Understanding Email Security Features.mp4 9.48MB
006. 13.5 Understanding Email Security Features en.srt 4.66KB
006. 14.5 Exploring Application Control in AMP for Endpoints.mp4 3.94MB
006. 14.5 Exploring Application Control in AMP for Endpoints en.srt 1.78KB
006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment.mp4 14.99MB
006. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment en.srt 6.61KB
006. 3.5 Understanding VXLAN and Network Overlays.mp4 9.92MB
006. 3.5 Understanding VXLAN and Network Overlays en.srt 4.52KB
006. 4.5 Exploring pxGrid.mp4 15.73MB
006. 4.5 Exploring pxGrid en.srt 7.29KB
006. 5.5 Surveying Authorization Models.mp4 14.79MB
006. 5.5 Surveying Authorization Models en.srt 6.49KB
006. 6.5 Exploring Cisco Stealthwatch.mp4 5.04MB
006. 6.5 Exploring Cisco Stealthwatch en.srt 2.82KB
006. 7.5 Exploring and Mitigating Common Layer 2 Threats.mp4 15.54MB
006. 7.5 Exploring and Mitigating Common Layer 2 Threats en.srt 6.25KB
007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.mp4 26.00MB
007. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (C.srt 11.49KB
007. 10.6 Deploying FlexVPN.mp4 19.52MB
007. 10.6 Deploying FlexVPN en.srt 9.59KB
007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes.mp4 5.61MB
007. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes en.srt 2.42KB
007. 13.6 Discussing Email Security in the Cloud.mp4 9.18MB
007. 13.6 Discussing Email Security in the Cloud en.srt 4.68KB
007. 14.6 Describing AMP for Endpoints Exclusion Sets.mp4 11.41MB
007. 14.6 Describing AMP for Endpoints Exclusion Sets en.srt 5.94KB
007. 2.6 Surveying SSL and TLS Implementations.mp4 13.73MB
007. 2.6 Surveying SSL and TLS Implementations en.srt 6.35KB
007. 3.6 Understanding Microsegmentation.mp4 9.23MB
007. 3.6 Understanding Microsegmentation en.srt 6.11KB
007. 4.6 Integrating and Automating Security Operations with Cisco Products.mp4 11.29MB
007. 4.6 Integrating and Automating Security Operations with Cisco Products en.srt 5.05KB
007. 5.6 Defining Accounting.mp4 5.96MB
007. 5.6 Defining Accounting en.srt 2.66KB
007. 6.6 Deploying Cisco Stealthwatch Cloud.mp4 8.61MB
007. 6.6 Deploying Cisco Stealthwatch Cloud en.srt 4.36KB
007. 7.6 Understanding and Configuring BPDU Guard and Root Guard.mp4 6.70MB
007. 7.6 Understanding and Configuring BPDU Guard and Root Guard en.srt 3.19KB
008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities.mp4 59.27MB
008. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities en.srt 28.85KB
008. 10.7 Troubleshooting Site-to-site VPN Implementations.mp4 13.43MB
008. 10.7 Troubleshooting Site-to-site VPN Implementations en.srt 7.88KB
008. 12.7 Exploring the Concepts of DevSecOps.mp4 12.64MB
008. 12.7 Exploring the Concepts of DevSecOps en.srt 6.26KB
008. 13.7 Introduction to Secure Internet Gateway (SIG).mp4 6.65MB
008. 13.7 Introduction to Secure Internet Gateway (SIG) en.srt 3.50KB
008. 14.7 Introduction to AMP for Endpoints Policies.mp4 1.95MB
008. 14.7 Introduction to AMP for Endpoints Policies en.srt 1.17KB
008. 2.7 Surveying IPsec Implementations.mp4 41.70MB
008. 2.7 Surveying IPsec Implementations en.srt 20.66KB
008. 3.7 Surveying Open Source SDN Solutions.mp4 10.03MB
008. 3.7 Surveying Open Source SDN Solutions en.srt 5.10KB
008. 5.7 Exploring Multifactor Authentication and Single Sign-On.mp4 24.59MB
008. 5.7 Exploring Multifactor Authentication and Single Sign-On en.srt 8.91KB
008. 6.7 On-Premise Monitoring with Stealthwatch Cloud.mp4 2.57MB
008. 6.7 On-Premise Monitoring with Stealthwatch Cloud en.srt 1.18KB
008. 7.7 Understanding and Configuring CDPLLDP.mp4 8.96MB
008. 7.7 Understanding and Configuring CDPLLDP en.srt 3.46KB
009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities.mp4 70.87MB
009. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities en.srt 30.30KB
009. 12.8 Surveying Cisco Umbrella.mp4 15.75MB
009. 12.8 Surveying Cisco Umbrella en.srt 7.83KB
009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella.mp4 10.13MB
009. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella en.srt 3.55KB
009. 14.8 Describing the Anyconnect AMP Enabler.mp4 1.14MB
009. 14.8 Describing the Anyconnect AMP Enabler en.srt 633B
009. 3.8 Understanding the Threats Against SDN Solutions.mp4 7.36MB
009. 3.8 Understanding the Threats Against SDN Solutions en.srt 3.49KB
009. 5.8 Exploring Examples of Multifactor and Single Sign-On.mp4 6.79MB
009. 5.8 Exploring Examples of Multifactor and Single Sign-On en.srt 2.38KB
009. 6.8 Exploring the Cisco TrustSec Solution.mp4 9.99MB
009. 6.8 Exploring the Cisco TrustSec Solution en.srt 4.47KB
009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4 15.08MB
009. 7.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt 8.33KB
010. 1.9 Understanding Buffer Overflows.mp4 20.08MB
010. 1.9 Understanding Buffer Overflows en.srt 8.70KB
010. 12.9 Exploring Cisco Cloud Email Security.mp4 5.21MB
010. 12.9 Exploring Cisco Cloud Email Security en.srt 3.23KB
010. 13.9 Exploring Cisco Umbrella Investigate.mp4 10.65MB
010. 13.9 Exploring Cisco Umbrella Investigate en.srt 4.75KB
010. 14.9 Exploring AMP for Endpoints Engines.mp4 3.30MB
010. 14.9 Exploring AMP for Endpoints Engines en.srt 1.99KB
010. 3.9 Understanding the Security Benefits in SDN Solutions.mp4 6.73MB
010. 3.9 Understanding the Security Benefits in SDN Solutions en.srt 2.82KB
010. 5.9 Understanding Cisco DUO.mp4 11.93MB
010. 5.9 Understanding Cisco DUO en.srt 6.53KB
010. 6.9 Describing the Benefits of Device Compliance and Application Control.mp4 5.57MB
010. 6.9 Describing the Benefits of Device Compliance and Application Control en.srt 2.94KB
010. 7.9 Exploring How to Secure the Management Plane.mp4 14.22MB
010. 7.9 Exploring How to Secure the Management Plane en.srt 7.23KB
011. 1.10 Surveying Unsecure Code Practices and Insecure APIs.mp4 11.40MB
011. 1.10 Surveying Unsecure Code Practices and Insecure APIs en.srt 5.81KB
011. 12.10 Exploring Cisco Cloudlock.mp4 13.50MB
011. 12.10 Exploring Cisco Cloudlock en.srt 6.91KB
011. 14.10 How to Utilize AMP for Endpoints Reporting Features.mp4 9.06MB
011. 14.10 How to Utilize AMP for Endpoints Reporting Features en.srt 5.04KB
011. 5.10 Introducing Cisco ISE.mp4 11.29MB
011. 5.10 Introducing Cisco ISE en.srt 4.75KB
011. 6.10 Introducing Network Segmentation.mp4 5.31MB
011. 6.10 Introducing Network Segmentation en.srt 2.85KB
011. 7.10 Exploring How to Secure the Control Plane.mp4 15.02MB
011. 7.10 Exploring How to Secure the Control Plane en.srt 8.10KB
012. 1.11 Understanding Security Threats in Cloud Environments.mp4 21.57MB
012. 1.11 Understanding Security Threats in Cloud Environments en.srt 11.76KB
012. 14.11 Introducing the Cisco Threat Response Solution.mp4 11.14MB
012. 14.11 Introducing the Cisco Threat Response Solution en.srt 3.42KB
012. 5.11 Understanding Cisco ISE Profiling Services.mp4 7.52MB
012. 5.11 Understanding Cisco ISE Profiling Services en.srt 4.35KB
012. 6.11 Exploring Application-based Segmentation.mp4 5.82MB
012. 6.11 Exploring Application-based Segmentation en.srt 2.97KB
012. 7.11 Exploring How to Secure the Data Plane.mp4 11.74MB
012. 7.11 Exploring How to Secure the Data Plane en.srt 6.09KB
013. 1.12 Understanding IoT Security Threats.mp4 37.32MB
013. 1.12 Understanding IoT Security Threats en.srt 14.19KB
013. 5.12 Understanding ISE Identity Services.mp4 11.73MB
013. 5.12 Understanding ISE Identity Services en.srt 5.90KB
013. 6.12 Understanding Cisco ACI.mp4 7.64MB
013. 6.12 Understanding Cisco ACI en.srt 3.63KB
014. 5.13 Describing ISE Authorization Rules.mp4 8.39MB
014. 5.13 Describing ISE Authorization Rules en.srt 3.62KB
014. 6.13 Describing Network Access with CoA.mp4 4.96MB
014. 6.13 Describing Network Access with CoA en.srt 2.36KB
015. 6.14 Integrating Different Security Systems Using pxGrid.mp4 9.92MB
015. 6.14 Integrating Different Security Systems Using pxGrid en.srt 4.22KB
016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr.mp4 18.02MB
016. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Thr en.srt 9.39KB
Distribution statistics by country
Russia (RU) 8
United Kingdom (GB) 1
Mexico (MX) 1
Kazakhstan (KZ) 1
Bulgaria (BG) 1
Hashemite Kingdom of Jordan (JO) 1
Slovenia (SI) 1
Total 14
IP List List of IP addresses which were distributed this torrent