Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

mp4   Hot:471   Size:202.5 MB   Created:2019-01-24 08:49:43   Update:2021-12-08 16:37:59  

File List

  • 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 15.57 MB
    3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 11.73 MB
    2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 11.2 MB
    5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 10.87 MB
    2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 10.52 MB
    6.5. Practical Applications/25.Using IDS and honeypots.mp4 10.47 MB
    3.2. Detection and Signature Engines/10.Monitoring the network.mp4 10.47 MB
    3.2. Detection and Signature Engines/12.Sweep scan.mp4 10.31 MB
    4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 9.52 MB
    4.3. Decisions and Actions/17.Trigger actions and responses.mp4 9.16 MB
    3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 9.11 MB
    2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 7.39 MB
    2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 7.06 MB
    5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 7.03 MB
    3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 6.64 MB
    2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 6.57 MB
    6.5. Practical Applications/26.The EINSTEIN system.mp4 6.44 MB
    6.5. Practical Applications/23.Monitoring and analyzing.mp4 6.31 MB
    4.3. Decisions and Actions/16.IDS signature files.mp4 6.31 MB
    4.3. Decisions and Actions/19.Managing IPS alarms.mp4 5.57 MB
    3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 5.09 MB
    1.Introduction/01.Welcome.mp4 4.76 MB
    6.5. Practical Applications/24.Syslog.mp4 4.76 MB
    1.Introduction/03.Packet Tracer and exercise files.mp4 3.16 MB
    7.Conclusion/27.Summary.mp4 2.65 MB
    1.Introduction/02.What you need to know.mp4 1.97 MB
    1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 1.77 MB
    2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt 6.5 KB
    3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt 6.41 KB
    6.5. Practical Applications/25.Using IDS and honeypots.en.srt 5.89 KB
    4.3. Decisions and Actions/17.Trigger actions and responses.en.srt 5.79 KB
    4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt 5.31 KB
    5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt 5.31 KB
    3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt 5.22 KB
    5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt 5.21 KB
    2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt 4.68 KB
    3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt 4.38 KB
    3.2. Detection and Signature Engines/12.Sweep scan.en.srt 4.28 KB
    3.2. Detection and Signature Engines/10.Monitoring the network.en.srt 4.27 KB
    2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt 4.15 KB
    2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt 4.04 KB
    2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt 3.96 KB
    4.3. Decisions and Actions/16.IDS signature files.en.srt 3.94 KB
    6.5. Practical Applications/23.Monitoring and analyzing.en.srt 3.91 KB
    5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt 3.8 KB
    6.5. Practical Applications/26.The EINSTEIN system.en.srt 3.65 KB
    4.3. Decisions and Actions/19.Managing IPS alarms.en.srt 3.43 KB
    3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt 3.12 KB
    6.5. Practical Applications/24.Syslog.en.srt 1.69 KB
    7.Conclusion/27.Summary.en.srt 1.57 KB
    1.Introduction/01.Welcome.en.srt 1.22 KB
    1.Introduction/02.What you need to know.en.srt 1.18 KB
    1.Introduction/03.Packet Tracer and exercise files.en.srt 1.04 KB
    1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt 895 B

Download Info

  • Tips

    “Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.