Magnetic link has been copied to the cutting board

Name Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

File Type video

Size 202.50MB

UpdateDate 2024-12-9

hash *****840F35E6D8710597A8A590E1A63CA41EAB

Hot 8

Files 1.Introduction/01.Welcome.en.srt | 1.22KB 1.Introduction/01.Welcome.mp4 | 4.76MB 1.Introduction/02.What you need to know.en.srt | 1.18KB 1.Introduction/02.What you need to know.mp4 | 1.97MB 1.Introduction/03.Packet Tracer and exercise files.en.srt | 1.04KB 1.Introduction/03.Packet Tracer and exercise files.mp4 | 3.16MB 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt | 895B 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 | 1.77MB 2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt | 4.15KB 2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 | 7.39MB 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt | 4.68KB 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 | 10.52MB 2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt | 3.96KB 2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 | 6.57MB 2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt | 6.50KB 2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 | 11.20MB 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt | 4.04KB 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 | 7.06MB 3.2. Detection and Signature Engines/10.Monitoring the network.en.srt | 4.27KB 3.2. Detection and Signature Engines/10.Monitoring the network.mp4 | 10.47MB 3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt | 6.41KB 3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 | 11.73MB 3.2. Detection and Signature Engines/12.Sweep scan.en.srt | 4.28KB 3.2. Detection and Signature Engines/12.Sweep scan.mp4 | 10.31MB 3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt | 5.22KB 3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 | 9.11MB 3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt | 3.12KB 3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 | 5.09MB 3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt | 4.38KB 3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 | 6.64MB 4.3. Decisions and Actions/16.IDS signature files.en.srt | 3.94KB 4.3. Decisions and Actions/16.IDS signature files.mp4 | 6.31MB 4.3. Decisions and Actions/17.Trigger actions and responses.en.srt | 5.79KB 4.3. Decisions and Actions/17.Trigger actions and responses.mp4 | 9.16MB 4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt | 5.31KB 4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 | 9.52MB 4.3. Decisions and Actions/19.Managing IPS alarms.en.srt | 3.43KB 4.3. Decisions and Actions/19.Managing IPS alarms.mp4 | 5.57MB 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt | 5.31KB 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 | 10.87MB 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt | 3.80KB 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 | 7.03MB 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt | 5.21KB 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 | 15.57MB 6.5. Practical Applications/23.Monitoring and analyzing.en.srt | 3.91KB 6.5. Practical Applications/23.Monitoring and analyzing.mp4 | 6.31MB 6.5. Practical Applications/24.Syslog.en.srt | 1.69KB 6.5. Practical Applications/24.Syslog.mp4 | 4.76MB 6.5. Practical Applications/25.Using IDS and honeypots.en.srt | 5.89KB 6.5. Practical Applications/25.Using IDS and honeypots.mp4 | 10.47MB 6.5. Practical Applications/26.The EINSTEIN system.en.srt | 3.65KB 6.5. Practical Applications/26.The EINSTEIN system.mp4 | 6.44MB 7.Conclusion/27.Summary.en.srt | 1.57KB 7.Conclusion/27.Summary.mp4 | 2.65MB

Recommend

Magnetic link has been copied to the cutting board