Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

File Information:
  1. Magnet Link:Magnet LinkMagnet Link
  2. File Size:207.36 MB
  3. Creat Time:2024-06-23
  4. Active Degree:29
  5. Last Active:2024-11-24
  6. File Tags:Lynda  CCNA  Security  210  260  Cert  Prep  6  Intrusion  Prevention  
  7. Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:

    Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

  1. 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 15.95 MB
  2. 3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 12.01 MB
  3. 2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 11.47 MB
  4. 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 11.13 MB
  5. 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 10.77 MB
  6. 6.5. Practical Applications/25.Using IDS and honeypots.mp4 10.72 MB
  7. 3.2. Detection and Signature Engines/10.Monitoring the network.mp4 10.72 MB
  8. 3.2. Detection and Signature Engines/12.Sweep scan.mp4 10.55 MB
  9. 4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 9.74 MB
  10. 4.3. Decisions and Actions/17.Trigger actions and responses.mp4 9.38 MB
  11. 3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 9.33 MB
  12. 2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 7.57 MB
  13. 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 7.23 MB
  14. 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 7.20 MB
  15. 3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 6.80 MB
  16. 2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 6.72 MB
  17. 6.5. Practical Applications/26.The EINSTEIN system.mp4 6.59 MB
  18. 6.5. Practical Applications/23.Monitoring and analyzing.mp4 6.47 MB
  19. 4.3. Decisions and Actions/16.IDS signature files.mp4 6.46 MB
  20. 4.3. Decisions and Actions/19.Managing IPS alarms.mp4 5.71 MB
  21. 3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 5.21 MB
  22. 1.Introduction/01.Welcome.mp4 4.87 MB
  23. 6.5. Practical Applications/24.Syslog.mp4 4.87 MB
  24. 1.Introduction/03.Packet Tracer and exercise files.mp4 3.23 MB
  25. 7.Conclusion/27.Summary.mp4 2.72 MB
  26. 1.Introduction/02.What you need to know.mp4 2.01 MB
  27. 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 1.81 MB
  28. 2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt 6 KB
  29. 3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt 6 KB
  30. 6.5. Practical Applications/25.Using IDS and honeypots.en.srt 6 KB
  31. 4.3. Decisions and Actions/17.Trigger actions and responses.en.srt 5 KB
  32. 4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt 5 KB
  33. 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt 5 KB
  34. 3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt 5 KB
  35. 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt 5 KB
  36. 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt 4 KB
  37. 3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt 4 KB
  38. 3.2. Detection and Signature Engines/12.Sweep scan.en.srt 4 KB
  39. 3.2. Detection and Signature Engines/10.Monitoring the network.en.srt 4 KB
  40. 2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt 4 KB
  41. 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt 4 KB
  42. 2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt 4 KB
  43. 4.3. Decisions and Actions/16.IDS signature files.en.srt 4 KB
  44. 6.5. Practical Applications/23.Monitoring and analyzing.en.srt 4 KB
  45. 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt 3 KB
  46. 6.5. Practical Applications/26.The EINSTEIN system.en.srt 3 KB
  47. 4.3. Decisions and Actions/19.Managing IPS alarms.en.srt 3 KB
  48. 3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt 3 KB
  49. 6.5. Practical Applications/24.Syslog.en.srt 1 KB
  50. 7.Conclusion/27.Summary.en.srt 1 KB