FileMood

Download Cisco CCNP Security SCOR (Exam 350-701)

Cisco CCNP Security SCOR Exam 350 701

Name

Cisco CCNP Security SCOR (Exam 350-701)

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

5.5 GB

Total Files

120

Last Seen

2025-08-15 00:08

Hash

29EE833CBB2010CE1B1B11C432DCF47631924AF8

/Chapter 3 Cloud Security Essentials/

001. Cloud Deployment and Service Models.mp4

170.1 MB

001. Cloud Deployment and Service Models.en.srt

35.2 KB

002. Security Responsibilities in the Cloud.en.srt

14.3 KB

002. Security Responsibilities in the Cloud.mp4

64.1 MB

003. Miscellaneous Cloud Security Topics.en.srt

35.6 KB

003. Miscellaneous Cloud Security Topics.mp4

138.5 MB

/Chapter 1 Network Security and Cryptography Fundamentals/

001. Course Overview.mp4

49.3 MB

002. Threats, Vulnerabilities, Exploits and Mitigations.en.srt

16.7 KB

002. Threats, Vulnerabilities, Exploits and Mitigations.mp4

76.8 MB

003. Common Threats to On-Prem.en.srt

30.0 KB

003. Common Threats to On-Prem.mp4

107.7 MB

004. Common Threats in the Cloud.en.srt

21.9 KB

004. Common Threats in the Cloud.mp4

89.1 MB

005. Common Security Vulnerabilities.en.srt

21.8 KB

005. Common Security Vulnerabilities.mp4

97.0 MB

006. Some Attack Mitigations.en.srt

26.2 KB

006. Some Attack Mitigations.mp4

106.6 MB

007. Introduction to Cryptography.en.srt

19.9 KB

007. Introduction to Cryptography.mp4

79.1 MB

008. Modern Cryptographic Solutions.en.srt

37.3 KB

008. Modern Cryptographic Solutions.mp4

138.9 MB

009. Fundamentals of PKI.en.srt

28.5 KB

009. Fundamentals of PKI.mp4

143.2 MB

010. Using the PKI.en.srt

22.5 KB

010. Using the PKI.mp4

107.9 MB

011. IKE v1 vs IKE v2.en.srt

12.7 KB

011. IKE v1 vs IKE v2.mp4

55.6 MB

012. VPN Options.en.srt

29.6 KB

012. VPN Options.mp4

111.2 MB

013. Security Intelligence Auth, Sharing, Consumption.en.srt

17.9 KB

013. Security Intelligence Auth, Sharing, Consumption.mp4

78.5 MB

014. Endpoint Protections Social Engineering Attacks.en.srt

26.4 KB

014. Endpoint Protections Social Engineering Attacks.mp4

150.3 MB

015. Types of Social Engineering Attacks.en.srt

31.3 KB

015. Types of Social Engineering Attacks.mp4

134.2 MB

016. Northbound and Southbound APIs of SDN.en.srt

22.3 KB

016. Northbound and Southbound APIs of SDN.mp4

92.0 MB

017. Python Scripts for Security Appliance API Calls.en.srt

28.1 KB

017. Python Scripts for Security Appliance API Calls.mp4

126.5 MB

001. Course Overview.en.srt

10.1 KB

/Chapter 2 Advanced Network Security and Configuration Techniques/

001. Intrusion Prevention versus Firewalling.en.srt

20.4 KB

001. Intrusion Prevention versus Firewalling.mp4

102.0 MB

002. Deployment Models for Network Security.en.srt

25.0 KB

002. Deployment Models for Network Security.mp4

97.4 MB

003. NetFlow and Flexible NetFlow.en.srt

18.3 KB

003. NetFlow and Flexible NetFlow.mp4

78.4 MB

004. Network Segmentation.en.srt

15.4 KB

004. Network Segmentation.mp4

63.4 MB

005. DHCP Snooping.en.srt

26.7 KB

005. DHCP Snooping.mp4

116.8 MB

006. DAI and IP Source Guard.en.srt

12.4 KB

006. DAI and IP Source Guard.mp4

52.5 MB

007. Private VLANs.en.srt

38.0 KB

007. Private VLANs.mp4

139.2 MB

008. Storm Control.en.srt

16.9 KB

008. Storm Control.mp4

75.8 MB

009. Port Security and VLAN Hopping Attacks.en.srt

36.6 KB

009. Port Security and VLAN Hopping Attacks.mp4

129.9 MB

010. Hardening the Network Infrastructure.en.srt

19.8 KB

010. Hardening the Network Infrastructure.mp4

78.6 MB

011. Access Control Policies.en.srt

27.2 KB

011. Access Control Policies.mp4

109.4 MB

012. Management Options for Security Solutions.en.srt

13.6 KB

012. Management Options for Security Solutions.mp4

55.4 MB

013. Configure AAA for Device and Network Access.en.srt

24.2 KB

013. Configure AAA for Device and Network Access.mp4

91.5 MB

014. Configure Secure Network Management.en.srt

22.8 KB

014. Configure Secure Network Management.mp4

91.0 MB

015. Configure and Verify the Site-to-Site VPN.en.srt

20.3 KB

015. Configure and Verify the Site-to-Site VPN.mp4

81.3 MB

016. Configure and Verify the Remote Access VPN.en.srt

26.8 KB

016. Configure and Verify the Remote Access VPN.mp4

111.4 MB

017. Debugging and Showing IPsec Verifications.en.srt

37.2 KB

017. Debugging and Showing IPsec Verifications.mp4

137.5 MB

/Chapter 4 Cisco Security Solutions Configuration and Analysis/

001. Introducing Cisco Firepower Devices.en.srt

32.9 KB

001. Introducing Cisco Firepower Devices.mp4

129.9 MB

002. Traffic Redirection and Capture Methods.en.srt

21.7 KB

002. Traffic Redirection and Capture Methods.mp4

87.7 MB

003. Web Proxy Identity and Authentication.en.srt

22.8 KB

003. Web Proxy Identity and Authentication.mp4

91.2 MB

004. Compare ESA, CES, WSA.en.srt

20.1 KB

004. Compare ESA, CES, WSA.mp4

78.0 MB

005. The WSA and ESA Architectures.en.srt

24.8 KB

005. The WSA and ESA Architectures.mp4

97.5 MB

006. Configure and Verify the WSA.en.srt

27.8 KB

006. Configure and Verify the WSA.mp4

88.5 MB

007. Configure and Verify the ESA.en.srt

23.3 KB

007. Configure and Verify the ESA.mp4

84.7 MB

008. Describe the Cisco Umbrella Solution.en.srt

12.2 KB

008. Describe the Cisco Umbrella Solution.mp4

46.5 MB

009. Configure and Verify Cisco Umbrella.en.srt

14.2 KB

009. Configure and Verify Cisco Umbrella.mp4

56.4 MB

/Chapter 5 Endpoint Security and Management Strategies/

001. EPP versus EDR and Cisco AMP.en.srt

12.7 KB

001. EPP versus EDR and Cisco AMP.mp4

49.1 MB

002. Miscellaneous Endpoint Security.en.srt

7.8 KB

002. Miscellaneous Endpoint Security.mp4

31.6 MB

003. Outbreak Control.en.srt

19.7 KB

003. Outbreak Control.mp4

85.8 MB

004. Describe MDM.en.srt

17.0 KB

004. Describe MDM.mp4

85.9 MB

005. Describe an MFA Strategy.en.srt

22.6 KB

005. Describe an MFA Strategy.mp4

103.9 MB

006. Endpoint Posture Assessment Solutions.en.srt

17.6 KB

006. Endpoint Posture Assessment Solutions.mp4

77.2 MB

007. Explain an Endpoint Patching Strategy.en.srt

24.2 KB

007. Explain an Endpoint Patching Strategy.mp4

102.5 MB

/Chapter 6 Advanced Cisco Network Security Techniques/

001. Guest Services and BYOD.en.srt

24.6 KB

001. Guest Services and BYOD.mp4

91.9 MB

002. Configure and Verify 802.1X, MAB, and WebAuth.en.srt

18.6 KB

002. Configure and Verify 802.1X, MAB, and WebAuth.mp4

70.9 MB

003. Network Access with CoA.en.srt

9.2 KB

003. Network Access with CoA.mp4

39.1 MB

004. Device Compliance and Application Control.en.srt

20.4 KB

004. Device Compliance and Application Control.mp4

85.9 MB

005. Explain Exfiltration Techniques.en.srt

13.0 KB

005. Explain Exfiltration Techniques.mp4

51.2 MB

006. Benefits of Network Telemetry.en.srt

13.4 KB

006. Benefits of Network Telemetry.mp4

62.1 MB

007. Describe Various Cisco Security Products.en.srt

13.2 KB

007. Describe Various Cisco Security Products.mp4

57.4 MB

 

Total files 120


Copyright © 2025 FileMood.com