FILENAME | SIZE | | 1.Introduction/01.Welcome.en.srt | 1.2 KB |
| 1.Introduction/01.Welcome.mp4 | 4.8 MB |
| 1.Introduction/02.What you need to know.en.srt | 1.2 KB |
| 1.Introduction/02.What you need to know.mp4 | 2 MB |
| 1.Introduction/03.Packet Tracer and exercise files.en.srt | 1 KB |
| 1.Introduction/03.Packet Tracer and exercise files.mp4 | 3.2 MB |
| 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt | 895 B |
| 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 | 1.8 MB |
| 2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt | 4.1 KB |
| 2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 | 7.4 MB |
| 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt | 4.7 KB |
| 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 | 10.5 MB |
| 2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt | 4 KB |
| 2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 | 6.6 MB |
| 2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt | 6.5 KB |
| 2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 | 11.2 MB |
| 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt | 4 KB |
| 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 | 7.1 MB |
| 3.2. Detection and Signature Engines/10.Monitoring the network.en.srt | 4.3 KB |
| 3.2. Detection and Signature Engines/10.Monitoring the network.mp4 | 10.5 MB |
| 3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt | 6.4 KB |
| 3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 | 11.7 MB |
| 3.2. Detection and Signature Engines/12.Sweep scan.en.srt | 4.3 KB |
| 3.2. Detection and Signature Engines/12.Sweep scan.mp4 | 10.3 MB |
| 3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt | 5.2 KB |
| 3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 | 9.1 MB |
| 3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt | 3.1 KB |
| 3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 | 5.1 MB |
| 3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt | 4.4 KB |
| 3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 | 6.6 MB |
| 4.3. Decisions and Actions/16.IDS signature files.en.srt | 3.9 KB |
| 4.3. Decisions and Actions/16.IDS signature files.mp4 | 6.3 MB |
| 4.3. Decisions and Actions/17.Trigger actions and responses.en.srt | 5.8 KB |
| 4.3. Decisions and Actions/17.Trigger actions and responses.mp4 | 9.2 MB |
| 4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt | 5.3 KB |
| 4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 | 9.5 MB |
| 4.3. Decisions and Actions/19.Managing IPS alarms.en.srt | 3.4 KB |
| 4.3. Decisions and Actions/19.Managing IPS alarms.mp4 | 5.6 MB |
| 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt | 5.3 KB |
| 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 | 10.9 MB |
| 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt | 3.8 KB |
| 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 | 7 MB |
| 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt | 5.2 KB |
| 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 | 15.6 MB |
| 6.5. Practical Applications/23.Monitoring and analyzing.en.srt | 3.9 KB |
| 6.5. Practical Applications/23.Monitoring and analyzing.mp4 | 6.3 MB |
| 6.5. Practical Applications/24.Syslog.en.srt | 1.7 KB |
| 6.5. Practical Applications/24.Syslog.mp4 | 4.8 MB |
| 6.5. Practical Applications/25.Using IDS and honeypots.en.srt | 5.9 KB |
| 6.5. Practical Applications/25.Using IDS and honeypots.mp4 | 10.5 MB |
| 6.5. Practical Applications/26.The EINSTEIN system.en.srt | 3.7 KB |
| 6.5. Practical Applications/26.The EINSTEIN system.mp4 | 6.4 MB |
| 7.Conclusion/27.Summary.en.srt | 1.6 KB |
| 7.Conclusion/27.Summary.mp4 | 2.7 MB |