Details for this torrent 

Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention
Type:
Other > Other
Files:
54
Size:
202.5 MiB (212333415 Bytes)
Uploaded:
2018-07-20 12:28:04 GMT
By:
xHOBBiTx
Seeders:
0
Leechers:
3
Comments
0  

Info Hash:
4CE3D840F35E6D8710597A8A590E1A63CA41EABF




(Problems with magnets links are fixed by upgrading your torrent client!)
Title: CCNA Security (210-260) Cert Prep: 6 Intrusion Prevention
Publisher: Lynda
Type: Network Administration
URL: https://www.lynda.com/Cisco-Routers-tutorials/CCNA-Security-210-260-Cert-Prep-6-Intrusion-Prevention/688537-2.html
Author: Lisa Bock
Duration: 1h 11m
Skill: Intermediate

1.Introduction/01.Welcome.en.srt1.22 KiB
1.Introduction/01.Welcome.mp44.76 MiB
1.Introduction/02.What you need to know.en.srt1.18 KiB
1.Introduction/02.What you need to know.mp41.97 MiB
1.Introduction/03.Packet Tracer and exercise files.en.srt1.04 KiB
1.Introduction/03.Packet Tracer and exercise files.mp43.16 MiB
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt895 B
1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp41.77 MiB
2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt4.15 KiB
2.1. IDS and IPS Overview/05.Managing the threat landscape.mp47.39 MiB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt4.68 KiB
2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp410.52 MiB
2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt3.96 KiB
2.1. IDS and IPS Overview/07.IPS versus IDS.mp46.57 MiB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt6.5 KiB
2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp411.2 MiB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt4.04 KiB
2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp47.06 MiB
3.2. Detection and Signature Engines/10.Monitoring the network.en.srt4.27 KiB
3.2. Detection and Signature Engines/10.Monitoring the network.mp410.47 MiB
3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt6.41 KiB
3.2. Detection and Signature Engines/11.Signature-based IDS.mp411.73 MiB
3.2. Detection and Signature Engines/12.Sweep scan.en.srt4.28 KiB
3.2. Detection and Signature Engines/12.Sweep scan.mp410.31 MiB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt5.22 KiB
3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp49.11 MiB
3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt3.12 KiB
3.2. Detection and Signature Engines/14.Reputation-based IDS.mp45.09 MiB
3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt4.38 KiB
3.2. Detection and Signature Engines/15.Policy-based IDS.mp46.64 MiB
4.3. Decisions and Actions/16.IDS signature files.en.srt3.94 KiB
4.3. Decisions and Actions/16.IDS signature files.mp46.31 MiB
4.3. Decisions and Actions/17.Trigger actions and responses.en.srt5.79 KiB
4.3. Decisions and Actions/17.Trigger actions and responses.mp49.16 MiB
4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt5.31 KiB
4.3. Decisions and Actions/18.Blacklist and whitelist.mp49.52 MiB
4.3. Decisions and Actions/19.Managing IPS alarms.en.srt3.43 KiB
4.3. Decisions and Actions/19.Managing IPS alarms.mp45.57 MiB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt5.31 KiB
5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp410.87 MiB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt3.8 KiB
5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp47.03 MiB
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt5.21 KiB
5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp415.57 MiB
6.5. Practical Applications/23.Monitoring and analyzing.en.srt3.91 KiB
6.5. Practical Applications/23.Monitoring and analyzing.mp46.31 MiB
6.5. Practical Applications/24.Syslog.en.srt1.69 KiB
6.5. Practical Applications/24.Syslog.mp44.76 MiB
6.5. Practical Applications/25.Using IDS and honeypots.en.srt5.89 KiB
6.5. Practical Applications/25.Using IDS and honeypots.mp410.47 MiB
6.5. Practical Applications/26.The EINSTEIN system.en.srt3.65 KiB
6.5. Practical Applications/26.The EINSTEIN system.mp46.44 MiB
7.Conclusion/27.Summary.en.srt1.57 KiB
7.Conclusion/27.Summary.mp42.65 MiB