PluralSight - Implementing Service Provider Security And Application Control

Torrent Details


PluralSight - Implementing Service Provider Security and Application Control

NAME
PluralSight - Implementing Service Provider Security and Application Control.torrent
CATEGORY
Other
INFOHASH
ea6b58ce6460e229376084eb6f64fa499896273d
SIZE
269 MB in 58 files
ADDED
Uploaded on 06-07-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Implementing Service Provider Security and Application Control



https://DevCourseWeb.com

Released 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Advanced | Genre: eLearning | Language: English + vtt | Duration: 2h 25m | Size: 277.5 MB

When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes

Service provider security introduces many new tools and techniques, many of which are network-oriented, to secure the carrier’s network environment. In this course, Implementing Service Provider Security and Application Control, you'll learn how to secure SP networks and prioritize traffic using various techniques. First, you'll explore how to build the core network using multiple dual-stacked routing protocols, then harden it with basic security features. Next, you'll delve into developing a distributed denial of service (DDoS) defensive structure using BGP flowspec in conjunction with sinkholes and scrubbing centers. Lastly, you'll discover the three common MPLS quality of service (QoS) models commonly seen within service provider networks, prioritizing important flows while reducing the impact of malicious ones. When you're finished with this course, you'll have the skills necessary to analyze, harden, and optimize the security posture of service provider networks.

Homepage

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp44.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt2.4 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/1. Course Introduction, Expectations, and Topology Review.mp48.7 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/1. Course Introduction, Expectations, and Topology Review.vtt5.3 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/2. Demo - Reviewing the OSPFv2 and LDP Core.mp48.8 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/2. Demo - Reviewing the OSPFv2 and LDP Core.vtt4.6 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/3. Understanding LDP Session Protection and IGP Synchronization.mp47.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/3. Understanding LDP Session Protection and IGP Synchronization.vtt4.5 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/4. Demo - Configuring LDP Session Protection.mp49.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/4. Demo - Configuring LDP Session Protection.vtt4.6 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/5. Demo - Configuring IGP Synchronization.mp412.2 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/5. Demo - Configuring IGP Synchronization.vtt5.4 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/6. Demo - Filtering LDP Label Advertisements.mp45.4 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/6. Demo - Filtering LDP Label Advertisements.vtt3.2 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/7. Module Review.mp41.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/7. Module Review.vtt1.3 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/1. Understanding the Customer Networks.mp44.6 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/1. Understanding the Customer Networks.vtt2.7 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/2. Demo - Configuring IPv6 Multi-topology IS-IS.mp418.7 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/2. Demo - Configuring IPv6 Multi-topology IS-IS.vtt8.4 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/3. Demo - Configuring Dual-stack OSPFv3.mp415.2 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/3. Demo - Configuring Dual-stack OSPFv3.vtt7.6 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/4. Module Review.mp41.3 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/4. Module Review.vtt1.2 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/1. Common Service Provider Security Techniques.mp45.6 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/1. Common Service Provider Security Techniques.vtt4.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/2. Demo - Configuring Infrastructure ACLs (IACL).mp415.7 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/2. Demo - Configuring Infrastructure ACLs (IACL).vtt7.7 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/3. Demo - Configuring Unicast Reverse Path Forwarding (URPF).mp410.5 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/3. Demo - Configuring Unicast Reverse Path Forwarding (URPF).vtt5.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/4. Demo - Securing OSPF and BGP Sessions with TTL-security.mp412.7 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/4. Demo - Securing OSPF and BGP Sessions with TTL-security.vtt6.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/5. Module Review.mp41.5 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/5. Module Review.vtt1.5 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/1. QoS Techniques - Classifying, Marking, Queuing, and Traffic C.mp410.8 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/1. QoS Techniques - Classifying, Marking, Queuing, and Traffic C.vtt7.6 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/2. Comparing the Three MPLS QoS Models.mp411.5 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/2. Comparing the Three MPLS QoS Models.vtt5.9 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/3. Demo - Implementing the Short Pipe QoS Model.mp425.9 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/3. Demo - Implementing the Short Pipe QoS Model.vtt12.4 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/4. Demo - Implementing the Long Pipe QoS Model.mp421.4 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/4. Demo - Implementing the Long Pipe QoS Model.vtt9.7 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/5. Demo - Implementing the Uniform QoS Model.mp422.1 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/5. Demo - Implementing the Uniform QoS Model.vtt10.9 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/6. Module Review.mp41.4 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/6. Module Review.vtt1.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/1. Securing Device Access with AAA - RADIUS and TACACS.mp47 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/1. Securing Device Access with AAA - RADIUS and TACACS.vtt5.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/2. How Can We Protect Devices Themselves.mp42.7 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/2. How Can We Protect Devices Themselves.vtt2 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/3. Demo - Protecting Devices with CPP and LPTS.mp413.5 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/3. Demo - Protecting Devices with CPP and LPTS.vtt6.5 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/4. Validating BGP Advertisements with BGPsec.mp47 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/4. Validating BGP Advertisements with BGPsec.vtt4.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/5. Course Review and Additional Resources.mp41.4 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/5. Course Review and Additional Resources.vtt1.3 KB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/playlist.m3u3.5 KB

Alternative Torrents for 'PluralSight Implementing Service Provider Security and Application Control'.

There are no alternative torrents found.