Jump to content

Search the Community

Showing results for tags 'Security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 84 results

  1. CBT- Automate Network Configurations with Nornir Automate Network Configurations with Nornir CBT-Understand Automation Security ]Understand Automation Security CBT - Understand the Nornir Automation Framework Understand the Nornir Automation Framework Do not use hide tag for public access links. Hide tag are only meant for download links.
  2. CCIE/CCNP Security SNCF 300-710: Todd Lammle Authorized (2020) English | 2020 | AISN: B086WYQQXN | 635 Pages | PDF, AZW | 81 + 121 MB Best Selling Cisco Author Todd Lammle has just completed his newest study guide: CCNP Security Securing Networks with Cisco Firepower (SNCF) 300-710—the most popular CCNP Security elective! This book, written by the preeminent Cisco Firepower expert, thoroughly covers the Cisco CCNP SNCF exam objectives in a step-by-step, user friendly manner that will help get you through the grueling Cisco exam the first time!Covers ALL the CCNP Security Cisco Firepower SNCF 300-710 exam objectives! Real life examples abound in this book!You will go step-by-step through setting up a Cisco Firepower Management Center (FMC) and Cisco Firepower Threat Defense (FTD), as well as the Firepower 7000/8000 Appliances.Learn the following:Install a virtual and hardware FMC with System configuration, licensing and health policy, and then bring your devices into the FMC to be managed.Install a Cisco Firepower Appliance using inline, passive, switching, routing and BVI.Includes 4100/9300 Install with FXOS and Chassis Manager in-depth!Learn and configure High Availability for hardware FMC's and all FTD devices, followed by an intense monitoring and troubleshooting section.Configure FXOS Chassis Manager and bring up a virtual FTD and ASA image, as well as RadWare. Configure multi-instance on the Chassis manager, and then understand what a cluster is and how to configure a cluster. Most importantly, understand the traffic flow which is very important or the exam and not written anywhere else! Learn about FTD 1000/2100/4100 and 9300 new Devices and how to install, perform password recovery and how to bring them into a FMC!Install a Cisco Firepower Threat Defense (FTD) and configure it with IP addresses, IP routing, NAT and VPN. Prepare it to be managed by a FMCConfigure the full Snort process of Security Intelligence (SI), Prefilter, DNS Policy, SSL Policy, Network Analyst Policy (NAP), AD Identity Policy and Realms, the main Access Control Policy, QoS, Firepower Network Discovery, File & Malware Policy, IPS policy, Advanced IPS policy, User Management, Advanced Network Analysis and more!Experience the detailed step-by-step building of an intense and detailed Access Control Policy (ACP), designed by the most experienced Firepower instructor/consultant that you can use in your own network!Learn how to tune your Cisco FMC policies with advanced network analysis tools found only in this book! Create, configure and manage a Cisco Snort IPS policy in detail, and fine tune it!Created by an author with more than 30 years' experience in Cisco, and over 10,000 FTD device installs! The amount of Cisco Firepower knowledge in this book cannot be beat!This book is focused on the CCNP Security Cisco Firepower SNCF objectives! You Will Pass!Add a www.lammle.com/firepower membership to gain intense practice questions, detailed videos that go through every chapter of this book, and also rent pods for lab practice! PDF [hide][Hidden Content]] AZW [hide][Hidden Content]]
  3. eLearnSecurity courses at one place eLearnSecurity – Advanced Reverse Engineering of Software(ARES) [hide][Hidden Content]] eLearnSecurity – Mobile Application Security and Penetration Testing (MASPT v2) [hide][Hidden Content]] eLearnSecurity – PNDv1 [hide][Hidden Content]] eLearnSecurity – Penetration Testing Professional v4 [hide][Hidden Content]] eLearnSecurity – eWPTX, ePTPv3, eWAPTv2 [hide][Hidden Content]] Credit goes to bvn63 Do not use RED color font in your posts, red color is meant for moderators only. MOVED TOPIC Topic is moved to proper section. Open topic in appropriate section with suitable prefix.
  4. INE - Network Security Automation (2020) Network Security Automation This course focuses on the implementation of Security automated solutions. APIs of certain security appliances are also discussed, including their capabilities, characteristics, and components. Course:- Course Introduction Firepower APIs ISE & pxGrid APIs Umbrella APIs Content Security APIs Threat Grid APIs FMC API - Introduction FMC API - Automating Authentication FMC API - Manipulating Objects FMC API - Manipulating Policies Umbrella Enforcement API Umbrella Investigate API Course Conclusion [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  5. Please find below download link to INE CCIE v5 Advanced Technologies Videos. [Hidden Content] Kind Regards, JS
  6. INE - TrustSec Course Description:- Learn how to protect your critical business assets with software-defined segmentation. Scalability, consistent policy enforcement, simplified provisioning and management of secure network access are just some of the benefits offered by Cisco TrustSec. This course discusses TrustSec in detail and explains how to implement, verify and troubleshoot this technology on different Cisco platforms. DOWNLOAD LINK 1:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] DOWNLOAD LINK 2:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  7. Linkedin - Microsoft 365 Security Administration: Implement and Manage Identity and Access (2020) MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Duration: 2h 1m Skill Level: Intermediate | Genre: eLearning | Language: English + Subtitles | Size: 207.27 MB Unfortunately, up to 99% of cloud security failures are the fault of customers. Beat the statistics. Learn how to implement secure user access to your Microsoft 365 tenant using this step-by-step configuration guide from Microsoft Certified Trainer Ugo Lopez. Ugo covers managing user and groups, setting password policies, implementing multi-factor authentication, configuring Azure AD Identity Protection, working with Active Directory Federation Services (ADFS), and installing Azure AD Connect. He also provides an introduction to conditional access and device management. Don’t let Microsoft 365 be the point of failure for your organization. Use this course to plan and implement solid security strategies and ensure compliance with all applicable policies and regulations. Note: This course is aligned with the objectives in the first domain of the Microsoft 365 Security Administration exam (MS-500), Implement and Manage Identity and Access Topics include: Managing user and groups Managing password policies Configuring Azure AD Privileged Identity Management Setting up multi-factor authentication Adding role assignments with Azure RBAC Managing Azure AD Identity Protection Installing Azure AD Connect Setting up conditionals and device access [Hidden Content]
  8. INE - Layer 2 Security This module of our CCIE Security v5 Technology series focuses on network security technologies deployed to protect switching environments against common Layer 2 attacks & threats. Throughout this course, you will learn about Layer 2 security protection tools & features, such as DHCP Snooping, Dynamic ARP Inspection, Port Security, Private VLANs, and more. DOWNLOAD LINK 1 :- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] DOWNLOAD LINK 2:- [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] *Note:- Both The Download Links Above Are Interchangeable.
  9. Udemy - Windows Privilege Escalation for OSCP & Beyond! (2020) Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell. What you'll learn Multiple methods for escalating privileges on a Windows system. In depth explanations of why and how these methods work. Tools which can help identify potential privilege escalation vulnerabilities on a Windows system. A setup script you can run on a (free) trial version of Windows 10, creating an intentionally vulnerable VM to practice privilege escalation on. Requirements A basic understanding of Windows systems Description This course teaches privilege escalation in Windows, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (150+), and a script which can be used by students to create an intentionally vulnerable Windows 10 configuration to practice their own privilege escalation skills on. This is a 100% privilege escalation course, with absolutely no filler! Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method. Who this course is for: Beginner and intermediate ethical hackers. Students currently taking or planning to take the PWK/OSCP course. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  10. Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology. This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks. [hide][Hidden Content]] Password: technet24.ir
  11. Azure: Essential Guide To Learn Microsoft Azure Fundamentals, Cloud, Security, Machine Learning And Devops (2020) English | April 4, 2020 | ASIN: B086SC77X3 | 169 Pages | PDF/EPUB | 1.09 MB Are you interested in programming and continuously looking for new ways to expand your knowledge and explore new information? Would you like to learn about one of the most popular cloud computing service platforms on the planet? Or maybe, you already heard about Microsoft Azure, and now you are looking for a complete guide that is going to cover the entire subject? If you answered "Yes" to at least one of these questions, then keep reading… In the 21st century, it is vital to go along with science and technology, especially if you want to maintain and even grow your financial independence. Being one of the first software technology companies in the world, Microsoft has created a lot of different platforms and systems throughout the years and one of them you are going to master in this book. Microsoft Azure – a cloud service platform that has been created for building, testing, deploying, and managing applications and services. During the course of this book, you will dive deep into Azure's fundamental and more advanced features. Take a look at only a few things you will get out of this book: What is Microsoft Azure, and why should you use it? Microsoft Azure services covered in detail Microsoft Azure for storage? What is the Azure cloud? Content delivery network for Microsoft Azure – a step-by-step guide Much much more... Keep in mind that this guide is not only for complete programming beginners. It is also for people who already have knowledge about computer programming, software, and various internet platform, but want to learn more and expand their expertise into new fields. Now it is your turn to take action. [hide][Hidden Content]]
  12. INE - OSCP Security Technology Prep Course Course Description This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course. Course Overview Course Introduction Introduction to Kali Linux Installing Kali Linux Command Line Refresher Kali Linux Services Bash Scripting in Kali Linux Information Gathering Information Gathering Scanning TCP vs UDP Scanning with Nmap Scanning with Nessus Scanning with Metasploit Enumeration Installing Kioptrix: Level 1 SSH Enumeration HTTP Enumeration SMB Enumeration DNS Enumeration Other Enumeration Netcat Introduction to Netcat Buffer Overflows Introduction to Buffer Overflows Fuzzing Finding the Offset Overwriting the EIP Finding Bad Characters Finding the Right Module Generating Shellcode & Gaining Root Exploitation Gaining Root with Metasploit Compiling an Exploit Modifying Shellcode Client Side Attacks Java Applet Attacks Antivirus Bypassing Pre-Exploit Password Attacks WebApp Exploitation Installing XSS & MySQL FILE Cross-Site Scripting (XSS) SQL Injection (SQLi) Local File Inclusion (LFI) Remote File Inclusion (RFI) File Transfers Introduction to File Transfers Privilege Escalation Introduction to Privilege Escalation Post Exploitation Linux Post Exploitation Windows Post Exploitation Post-Exploit Password Attacks Pivoting Capstone Kioptrix Level 1.1 Walkthrough BTRSys 2.1 Walkthrough DroopyCTF Walkthrough SickOS 1.2 Walkthrough Summary Course Conclusion [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  13. Please share latest exam dump 300-208 SISAS Thank a lot.
  14. INE - CCIE Security Advanced Technology Course v4 (Compressed/MKV) Instructor: Brian McGahan, CCIEx4 #8593, CCDE #2013::13 Format: MKV Size: 12.25GB The CCIE Security Advanced Technologies Class is the first step in understanding CCIE level technologies and is a companion to the Advanced Technologies Lab Workbook. Each technology you need to know for the CCIE Security lab will be described in detail using an instructor led hands on demonstration. The class consists of over 40 hours of in depth explanations and examples. More Info: [Hidden Content] Table of Contents: 01 - Introduction - 36 m 02 - Recommended Study Resources - 47 m 03 - ASA Firewall Overview - 43 m 04 - ASA Basic Initialization - 55 m 05 - ASA IP Routing - 45 m 06 - ASA ACLs - 50 m 07 - ASA High Availability Overview - 26 m 08 - ASA Active/Standby Failover - 46 m 09 - ASA Multiple Context Mode Overview - 28 m 10 - ASA Multiple Context Mode Configuration - 41 m 11 - ASA Active/Active Failover - 38 m 12 - ASA Transparent Firewall - 44 m 13 - ASA Transparent Firewall & ARP Filtering - 19 m 14 - ASA Transparent Failover - 39 m 15 - ASA Modular Policy Framework (MPF) Overview - 52 m 16 - ASA Modular Policy Framework (MPF) Configuration - 50 m 17 - ASA Advanced TCP Inspection with MPF - 39 m 18 - ASA Advanced Application Inspection with MPF - 35 m 19 - ASA Quality of Service (QoS) - 29 m 20 - ASA Network Address Translation (NAT) Part 1 - 49 m 21 - ASA Network Address Translation (NAT) Part 2 - 29 m 22 - ASA Redundant Interfaces - 21 m 23 - Standard, Extended, Time Based, & Dynamic ACLs - 73 m 24 - Reflexive ACLs - 36 m 25 - TCP Intercept - 23 m 26 - Content Based Access Control (CBAC) - 63 m 27 - CBAC High Availability - 63 m 28 - Zone Based Firewall (ZBPF) Overview - 20 m 29 - ZBPF Configuration - 47 m 30 - Port to Application Mapping (PAM) - 31 m 31 - ZBPF Parameter Tuning - 31 m 32 - ZBPF Application Inspection - 26 m 33 - IOS Transparent Firewall - 59 m 34 - ZBPF Transparent Firewall - 23 m 35 - IPsec VPN Overview - 46 m 36 - IOS LAN-to-LAN IPsec Configuration - 53 m 37 - IPsec Verification & Troubleshooting - 48 m 38 - ASA LAN-to-LAN IPsec Configuration - 72 m 39 - IOS & ASA PKI Overview - 43 m 40 - IPsec & PKI Certificates - 32 m 41 - GRE over IPsec Tunnels - 23 m 42 - IPSec Profiles & Virtual Tunnel Interfaces (VTIs) - 22 m 43 - Easy VPN Overview - 12 m 44 - IOS Easy VPN Server - 70 m 45 - IOS Easy VPN Client - 30 m 46 - IOS Easy VPN with Dynamic VTIs, ISAKMP Profiles - 49 m 47 - ASA Easy VPN Server - 51 m 48 - ASA Easy VPN Server & IOS Easy VPN Client - 16 m 49 - ASA Clientless & AnyConnect SSL VPN - 63 m 50 - DMVPN - 64 m 51 - IPS Overview, Promiscuous Mode & SPAN - 43 m 52 - IPS Promiscuous Mode & RSPAN - 28 m 53 - IPS Blocking Devices & Custom Signatures - 49 m 54 - IPS Inline Mode, VLAN Pairing - 15 m 55 - IPS Virtual Sensors and Signature Engines - 15 m 56 - WSA Overview & Initial Setup - 17 m 57 - WSA Management, Identities, & Access Policies - 29 m 58 - WSA HTTP Session Processing - 33 m 59 - WSA Transparent Mode & WCCP L2 Mode - 35 m 60 - WSA Transparent Mode & WCCP GRE Mode - 14 m 61 - WSA HTTPS Decryption Policies - 35 m 62 - AAA Overview, Local AAA, & Role Based CLI - 50 m 63 - IOS AAA with ACS - 50 m 64 - ASA AAA with ACS - 31 m 65 - ACS IOS Auth-Proxy Authentication - 30 m 66 - ACS IOS Auth-Proxy Authorization - 17 m 67 - ACS ASA Cut-Through Proxy - 23 m 68 - ISE Overview - 27 m 69 - 802.1x, MAB, & EAP Overview - 33 m 70 - ISE MAB Authentication - 31 m 71 - ISE 802.1x & MAB Authorization - 48 m 72 - ISE 802.1x Authentication - 42 m 73 - ISE MACsec - 29 m 74 - ISE Central Web Authentication - 56 m 75 - ISE Profiling - 27 m 76 - Wireless Overview - 21 m 77 - Wireless Client Authentication - 14 m 78 - Wireless Central Web Authentication - 42 m 79 - Wireless Control Plane Security - 29 m 80 - ASA ACLs :: Part 1 - 41 m 81 - ASA ACLs :: Part 2 - 40 m 82 - ASA Object NAT :: Part 1 - 39 m 83 - ASA Object NAT :: Part 2 - 55 m 84 - ASA Twice NAT :: Part 1 - 33 m 85 - ASA Twice NAT :: Part 2 - 30 m 86 - ASA Twice NAT :: Part 3 - 59 m 87 - IOS Static NAT :: Part 1 - 30 m 88 - IOS Static NAT :: Part 2 - 38 m 89 - IOS Dynamic & Stateful NAT - 57 m 90 - IOS NVI NAT - 19 m 91 - VRF Aware IPsec with CMAP - 56 m 92 - VRF Aware IPsec with GRE - 60 m 93 - IPsec High Availability :: Part 1 - 38 m 94 - IPsec High Availability :: Part 2 - 29 m 95 - IPsec Stateful High Avalability - 54 m 96 - GETVPN - 57 m 97 - GETVPN COOP - 46 m 98 - IKEv2 L2L on IOS & ASA :: Part 1 - 38 m 99 - IKEv2 L2L on IOS & ASA :: Part 2 - 34 m 100 - IKEv2 FlexVPN Client & Server :: Part 1 - 36 m 101 - IKEv2 FlexVPN Client & Server :: Part 2 - 37 m 102 - DTP & Port Security - 51 m 103 - VACL and PVLAN - 35 m 104 - DHCP Snooping &DAI & IPSG :: Part 1 - 36 m 105 - DHCP Snooping &DAI & IPSG :: Part 2 - 39 m 106 - IPv6 FHS From First Hop Security - 60 m Course Duration: 69hrs 27min [Hidden Content]
  15. Pluralsight Checkpoint Videos [Hidden Content]
  16. Hi! Can anyone share a good document or a book on FMC?
  17. Hi All, Can anyone please share official certguide book for 400-251?
  18. Can anyone help me in getting below presentation [Hidden Content]
  19. Hi All, I just wanted a quick piece of information. Does anyone have a clue when Cisco updates the lab schedule? Is their a GMT at which the schedule for any given destination or is it random? Thank you and regards.
  20. Hello Guys, Can anyone please share their views, approach, study material, lab manuals, real life experience...please.? Much appreciate if anyone so generous and kind enough to share so that it helps including me to cover all the areas in Security starting from the basics. Thanks...
  21. spravednikov

    HCNA-Sec

    Hi Who has any preparation materials HCNA-security (H13-711)?
  22. Can anyone share latest valid CSL for CCIE security lab3, and If anyone passed lab3 please share the right answers.
  23. INE - CCIE Security v4 Lab Preparation (Compressed/MKV) Instructor: Cristian Matei, CCIEx2 #23684 Format: MKV x 85 Size: 6.3GB The CCIE Security V4 Lab Preparation course is part lecture, part hands-on demonstration, and focuses both on developing a structured approach to CCIE lab strategy and advanced hands-on scenarios. This course will help candidates who are nearing their CCIE lab dates to refine and consolidate their technical knowledge into an organized and effective strategy for passing their lab exams. The goal of this class is for students to finish fully prepared to take and pass their CCIE Security Lab Exam within four weeks of completing the course. More Info: [Hidden Content] Table of Contents: 01.CBAC Routed Mode 02.CBAC HA 03.CBAC Transparent Mode 04.ZBPF Routed Mode :: Part 1 05.ZBPF Routed Mode :: Part 2 06.ZBPF HA & ASR 07.IOS NAT :: Part 1 08.IOS NAT :: Part 2 09.ZBPF ASR 10.ZBPF Transparent 11.IOS NAT :: Part 3 12.ASA 8.2 NAT :: Part 1 13.ASA 8.2 NAT :: Part 2 14.ASA 8.2 NAT :: Part 3 15.ZBPF Application Inspection 16.ASA 8.2 NAT :: Part 4 17.ASA 8.2 NAT :: Part 5 18.ASA 8.2 NAT :: Part 6 19.ASA Multi-context 20.ASA Active-Active Failover 21.ASH Transparent Mode 22.IKEv1 Overview 23.IKEv1 with Crypto Map 24.IKEv1 with GRE/SVTI 25.IKEv1 VRF Aware 26.IKEv1 with PKI 27.IKEv1 Aggressive vs Main Mode 28.IKEv1 High Availability 29.DMVPN :: Part 1 30.DMVPN :: Part 2 31.DMVPN :: Part 3 32.DMVPN :: Part 4 33.GETVPN :: Part 1 34.GETVPN :: Part 2 35.GETVPN with DMVPN :: Part 1 36.GETVPN with DMVPN :: Part 2 37.IKEv1 Remote Access :: Part 1 38.IKEv1 Remote Access :: Part 2 39.IKEv1 EZVPN Hardware Client :: Part 1 40.IKEv1 EZVPN Hardware Client :: Part 2 41.IKEv2 L2L :: Part 1 42.IKEv2 L2L :: Part 2 43.IKEv2 DMVPN 44.IKEv2 FlexVPN Server/Client :: Part 1 45.IKEv2 FlexVPN Server/Client :: Part 2 46.SSL VPN on ASA 47.SSL VPN on IOS 48.Local AAA OH IOS and ASA 49.AAA with TACACS :: Part 1 50.AAA with TACACS :: Part 2 51.IOS Auth - Proxy 52.ASA Cut - Through 53.MAB Authentication with ISE :: Part 1 54.MAB Authentication with ISE :: Part 2 55.802.1x Overview 56.EAP-Fast AHD ISE Profiling 57.802.1x Parameters 58.Wired CWA :: Part 1 59.Wired CWA :: Part 2 60.Wired CWA :: Part 3 61.Wireless EAP-Fast 62.Wireless CWA 63.Wireless LWA 64.IPS Overview 65.IPS Inline Mode 66.IPS Promiscuos Moded 67.IPS Block and Shaun 68.WSA Overview 69.WSA Access Policies 70.WSA Decryption Policies 71.WOCP Integration :: Part 1 72.WOCP Integration :: Part 2 73.STP Security 74.PVLAN :: Part 1 75.PVLAN :: Part 2 76.VACL 77.DHCP Snooping and DAI 78.DAI and IP Source Guard 79.VPN Troubleshooting :: Part 1 80.VPN Troubleshooting :: Part 2 81.VPN Troubleshooting :: Part 3 82.IPv6 RA and DHCP Guard 83.IPv6 Send 84.Lab Strategy :: Part 1 85.Lab Strategy :: Part 2 Total Duration: 63h 0m [Hidden Content]
  24. Hello Everyone, I am looking for CCIE Security dumps, also would like to know if someone recently passed with dumps.... any dumps is active right now ??? Thanks for your help in advance
  25. CCNP Security Technology Course: 300-208 SISAS Join our expert instructor, Cristian Matei, with real-world extensive experience for a comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SISAS exam which assesses knowledge of Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. This course will help candidates obtain a deeper understanding of Identity Services Engine architecture and functionalities, which will tremendously help them both for the certification exam and also for real-life deployments. Course Duration: 23hrs 25min Course Introduction CCNP Security Course Outline 21min Certification 28min Exam Preparation 23min Study Group 11min Lab Topology & Equipment 20min Total Duration: 1hrs 45min AAA Framework AAA Protocols 24min RADIUS 9min TACACS+ 13min Cisco's Authentication Servers 15min ISE Overview 20min Total Duration: 1hrs 23min Authentication & Authorization ISE Management 22min ISE Authentication Policies :: Part 1 12min ISE Authentication Policies :: Part 2 11min MAB Verification & Troubleshooting 13min MAB & 802.1x Common Authorizations 6min MAB & EAP Common Authorizations 10min Authorization Verification Troubleshooting 12min ACL Authorization :: dACL 30min ACL Authorization :: Filter-ID ACL 12min ACL Authorization :: Per-User ACL 31min Extensible Authentication Protocol (EAP) 28min Common EAP Tunneled Methods 25min Common EAP Non-Tunneled Methods 7min 802.1x Configuration Steps 13min Deploying EAP :: Part 1 18min Deploying EAP :: Part 2 22min EAP-FASTv1 Implementation 9min ISE Identity Sources 21min Authentication Against AD 22min AD Integration 22min ISE Application Server 22min Identity Prefix & Suffix Strip 22min User & Machine Authorization Policies :: Part 1 22min User & Machine Authorization Policies :: Part 2 27min Deploying EAP TLS 18min Issuing Certificates on ISE 17min Enrolling Users on a Certificate 15min User Authentication using EAP TLS 23min Importing CA Certificates 28min EAP-FASTv2 Chaining :: Part 1 23min EAP-FASTv2 Chaining :: Part 2 24min EAP-FASTv2 Chaining :: Part 3 15min Total Duration: 10hrs 14min Phased Deployment Default Supplicant Network Access 21min Layer 3 Authentication 17min Central Web Authentication Workflow 22min Phase 1 Configuration 23min Phase 2 Configuration 22min Total Duration: 1hrs 47min Layer 3 Authentication ISE Guest Services 12min Bring Your Own Device (BYOD) 13min Wi-Fi Deployments 21min Portal Policy 19min EAP-FASTv2 Chaining :: Part 4 22min EAP-FASTv2 Chaining :: Part 5 22min EndPoint Profiling 29min Profiling Policies 23min ISE Authorization Flow with Profiling 12min Profiling Configuration :: Part 1 13min Profiling Configuration :: Part 2 27min Profiling Configuration :: Part 3 26min Device Sensor Overview 30min Posture Assessment Overview 21min Posture Services 24min Posture Configuration :: Part 1 20min Posture Configuration :: Part 2 22min Posture Configuration :: Part 3 24min Posture Configuration :: Part 4 18min Layer 2 Encryption (MACSec) 19min Security Group Tags (SGT) 29min MACSec Implementation :: Part 1 22min MACSec Implementation :: Part 2 14min Total Duration: 8hrs 14min [Hidden Content]
×
×
  • Create New...