Lynda - CCNA Security (210-260) Cert Prep 6 Intrusion Prevention
- 收录时间:2018-12-20 07:14:40
- 文件大小:202MB
- 下载次数:112
- 最近下载:2021-01-20 16:47:55
- 磁力链接:
-
文件列表
- 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.mp4 16MB
- 3.2. Detection and Signature Engines/11.Signature-based IDS.mp4 12MB
- 2.1. IDS and IPS Overview/08.Host-based versus network IDS.mp4 11MB
- 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.mp4 11MB
- 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.mp4 11MB
- 6.5. Practical Applications/25.Using IDS and honeypots.mp4 10MB
- 3.2. Detection and Signature Engines/10.Monitoring the network.mp4 10MB
- 3.2. Detection and Signature Engines/12.Sweep scan.mp4 10MB
- 4.3. Decisions and Actions/18.Blacklist and whitelist.mp4 10MB
- 4.3. Decisions and Actions/17.Trigger actions and responses.mp4 9MB
- 3.2. Detection and Signature Engines/13.Anomaly-based IDS.mp4 9MB
- 2.1. IDS and IPS Overview/05.Managing the threat landscape.mp4 7MB
- 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.mp4 7MB
- 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.mp4 7MB
- 3.2. Detection and Signature Engines/15.Policy-based IDS.mp4 7MB
- 2.1. IDS and IPS Overview/07.IPS versus IDS.mp4 7MB
- 6.5. Practical Applications/26.The EINSTEIN system.mp4 6MB
- 6.5. Practical Applications/23.Monitoring and analyzing.mp4 6MB
- 4.3. Decisions and Actions/16.IDS signature files.mp4 6MB
- 4.3. Decisions and Actions/19.Managing IPS alarms.mp4 6MB
- 3.2. Detection and Signature Engines/14.Reputation-based IDS.mp4 5MB
- 1.Introduction/01.Welcome.mp4 5MB
- 6.5. Practical Applications/24.Syslog.mp4 5MB
- 1.Introduction/03.Packet Tracer and exercise files.mp4 3MB
- 7.Conclusion/27.Summary.mp4 3MB
- 1.Introduction/02.What you need to know.mp4 2MB
- 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).mp4 2MB
- 2.1. IDS and IPS Overview/08.Host-based versus network IDS.en.srt 7KB
- 3.2. Detection and Signature Engines/11.Signature-based IDS.en.srt 6KB
- 6.5. Practical Applications/25.Using IDS and honeypots.en.srt 6KB
- 4.3. Decisions and Actions/17.Trigger actions and responses.en.srt 6KB
- 4.3. Decisions and Actions/18.Blacklist and whitelist.en.srt 5KB
- 5.4. Deploying an IOS-Based IPS/20.Analyze the flow.en.srt 5KB
- 3.2. Detection and Signature Engines/13.Anomaly-based IDS.en.srt 5KB
- 5.4. Deploying an IOS-Based IPS/22.Configure an IPS.en.srt 5KB
- 2.1. IDS and IPS Overview/06.Overview and benefits of IDS and IPS.en.srt 5KB
- 3.2. Detection and Signature Engines/15.Policy-based IDS.en.srt 4KB
- 3.2. Detection and Signature Engines/12.Sweep scan.en.srt 4KB
- 3.2. Detection and Signature Engines/10.Monitoring the network.en.srt 4KB
- 2.1. IDS and IPS Overview/05.Managing the threat landscape.en.srt 4KB
- 2.1. IDS and IPS Overview/09.Prerequisites and restrictions for IPS.en.srt 4KB
- 2.1. IDS and IPS Overview/07.IPS versus IDS.en.srt 4KB
- 4.3. Decisions and Actions/16.IDS signature files.en.srt 4KB
- 6.5. Practical Applications/23.Monitoring and analyzing.en.srt 4KB
- 5.4. Deploying an IOS-Based IPS/21.Implementing an IPS.en.srt 4KB
- 6.5. Practical Applications/26.The EINSTEIN system.en.srt 4KB
- 4.3. Decisions and Actions/19.Managing IPS alarms.en.srt 3KB
- 3.2. Detection and Signature Engines/14.Reputation-based IDS.en.srt 3KB
- 6.5. Practical Applications/24.Syslog.en.srt 2KB
- 7.Conclusion/27.Summary.en.srt 2KB
- 1.Introduction/01.Welcome.en.srt 1KB
- 1.Introduction/02.What you need to know.en.srt 1KB
- 1.Introduction/03.Packet Tracer and exercise files.en.srt 1KB
- 1.Introduction/04.Prepare for the CCNA Security Exam (210-260).en.srt 895B