589689.xyz

Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention

  • 收录时间:2018-12-20 07:14:40
  • 文件大小:202MB
  • 下载次数:112
  • 最近下载:2021-01-20 16:47:55
  • 磁力链接:

文件列表

  1. 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 16MB
  2. 3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 12MB
  3. 2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 11MB
  4. 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 11MB
  5. 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 11MB
  6. 6.5. Practical Applications/25.Using IDS and honeypots.mp4 10MB
  7. 3.2. Detection and Signature Engines/10.Monitoring the network.mp4 10MB
  8. 3.2. Detection and Signature Engines/12.Sweep scan.mp4 10MB
  9. 4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 10MB
  10. 4.3. Decisions and Actions/17.Trigger actions and responses.mp4 9MB
  11. 3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 9MB
  12. 2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 7MB
  13. 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 7MB
  14. 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 7MB
  15. 3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 7MB
  16. 2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 7MB
  17. 6.5. Practical Applications/26.The EINSTEIN system.mp4 6MB
  18. 6.5. Practical Applications/23.Monitoring and analyzing.mp4 6MB
  19. 4.3. Decisions and Actions/16.IDS signature files.mp4 6MB
  20. 4.3. Decisions and Actions/19.Managing IPS alarms.mp4 6MB
  21. 3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 5MB
  22. 1.Introduction/01.Welcome.mp4 5MB
  23. 6.5. Practical Applications/24.Syslog.mp4 5MB
  24. 1.Introduction/03.Packet Tracer and exercise files.mp4 3MB
  25. 7.Conclusion/27.Summary.mp4 3MB
  26. 1.Introduction/02.What you need to know.mp4 2MB
  27. 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 2MB
  28. 2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt 7KB
  29. 3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt 6KB
  30. 6.5. Practical Applications/25.Using IDS and honeypots.en.srt 6KB
  31. 4.3. Decisions and Actions/17.Trigger actions and responses.en.srt 6KB
  32. 4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt 5KB
  33. 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt 5KB
  34. 3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt 5KB
  35. 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt 5KB
  36. 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt 5KB
  37. 3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt 4KB
  38. 3.2. Detection and Signature Engines/12.Sweep scan.en.srt 4KB
  39. 3.2. Detection and Signature Engines/10.Monitoring the network.en.srt 4KB
  40. 2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt 4KB
  41. 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt 4KB
  42. 2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt 4KB
  43. 4.3. Decisions and Actions/16.IDS signature files.en.srt 4KB
  44. 6.5. Practical Applications/23.Monitoring and analyzing.en.srt 4KB
  45. 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt 4KB
  46. 6.5. Practical Applications/26.The EINSTEIN system.en.srt 4KB
  47. 4.3. Decisions and Actions/19.Managing IPS alarms.en.srt 3KB
  48. 3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt 3KB
  49. 6.5. Practical Applications/24.Syslog.en.srt 2KB
  50. 7.Conclusion/27.Summary.en.srt 2KB
  51. 1.Introduction/01.Welcome.en.srt 1KB
  52. 1.Introduction/02.What you need to know.en.srt 1KB
  53. 1.Introduction/03.Packet Tracer and exercise files.en.srt 1KB
  54. 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt 895B