Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

Torrent Details

Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion PreventionLynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

NAME
Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention.torrent
CATEGORY
eBooks
INFOHASH
4ce3d840f35e6d8710597a8a590e1a63ca41eabf
SIZE
202 MB in 54 files
ADDED
Uploaded on 24-10-2018 by our crawler pet called "Spidey".
SWARM
0 seeders & 1 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Code:

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1.Introduction/01.Welcome.en.srt1.2 KB
1.Introduction/01.Welcome.mp44.8 MB
1.Introduction/02.What you need to know.en.srt1.2 KB
1.Introduction/02.What you need to know.mp42 MB
1.Introduction/03.Packet Tracer and exercise files.en.srt1 KB
1.Introduction/03.Packet Tracer and exercise files.mp43.2 MB
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt895 B
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp41.8 MB
2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt4.1 KB
2.1. IDS and IPS Overview/05.Managing the threat landscape.mp47.4 MB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt4.7 KB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp410.5 MB
2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt4 KB
2.1. IDS and IPS Overview/07.IPS versus IDS.mp46.6 MB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt6.5 KB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp411.2 MB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt4 KB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp47.1 MB
3.2. Detection and Signature Engines/10.Monitoring the network.en.srt4.3 KB
3.2. Detection and Signature Engines/10.Monitoring the network.mp410.5 MB
3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt6.4 KB
3.2. Detection and Signature Engines/11.Signature-based IDS.mp411.7 MB
3.2. Detection and Signature Engines/12.Sweep scan.en.srt4.3 KB
3.2. Detection and Signature Engines/12.Sweep scan.mp410.3 MB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt5.2 KB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp49.1 MB
3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt3.1 KB
3.2. Detection and Signature Engines/14.Reputation-based IDS.mp45.1 MB
3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt4.4 KB
3.2. Detection and Signature Engines/15.Policy-based IDS.mp46.6 MB
4.3. Decisions and Actions/16.IDS signature files.en.srt3.9 KB
4.3. Decisions and Actions/16.IDS signature files.mp46.3 MB
4.3. Decisions and Actions/17.Trigger actions and responses.en.srt5.8 KB
4.3. Decisions and Actions/17.Trigger actions and responses.mp49.2 MB
4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt5.3 KB
4.3. Decisions and Actions/18.Blacklist and whitelist.mp49.5 MB
4.3. Decisions and Actions/19.Managing IPS alarms.en.srt3.4 KB
4.3. Decisions and Actions/19.Managing IPS alarms.mp45.6 MB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt5.3 KB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp410.9 MB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt3.8 KB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp47 MB
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt5.2 KB
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp415.6 MB
6.5. Practical Applications/23.Monitoring and analyzing.en.srt3.9 KB
6.5. Practical Applications/23.Monitoring and analyzing.mp46.3 MB
6.5. Practical Applications/24.Syslog.en.srt1.7 KB
6.5. Practical Applications/24.Syslog.mp44.8 MB
6.5. Practical Applications/25.Using IDS and honeypots.en.srt5.9 KB
6.5. Practical Applications/25.Using IDS and honeypots.mp410.5 MB
6.5. Practical Applications/26.The EINSTEIN system.en.srt3.7 KB
6.5. Practical Applications/26.The EINSTEIN system.mp46.4 MB
7.Conclusion/27.Summary.en.srt1.6 KB
7.Conclusion/27.Summary.mp42.7 MB

Alternative Torrents for 'Lynda CCNA Security Cert Prep Intrusion Prevention'.

There are no alternative torrents found.