3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/5-Implementing MPF.ts87.97MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/6-ASA High Availability - Failover.ts16.94MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/7-Failover - Active Standby.ts80.87MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/8-Failover - Active Active.ts82.69MB
3-Perimeter Security and Intrusion Prevention/3-Perimeter Security/4-Advanced ASA Technologies/9-Clustering Overview.ts34.47MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/1-Introduction to Firepower Systems.ts52.38MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/2- Managing FTD.ts69.24MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/3-The Registration.ts51.72MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/4-Troubleshooting FTD.ts35.94MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/5-FTD Objects.ts20.94MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/6-Deployment Modes.ts63.01MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/7-FTD Initialization _ Routing.ts53.58MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/1-Firepower Threat Defense Basics/8-FTD Policies Overview.ts40.69MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/3-Security Intelligence (SI).ts82.92MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/4- URL Filtering.ts69.75MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/5-Network Discovery.ts50.37MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/6-File Policy.ts74.59MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/2-Policies _ Features/7- SSL Policy.ts75.29MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/1-Introduction to Next Generation IPS (NGIPS).ts23.7MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/2-Snort Variables _ Rules.ts74.69MB
3-Perimeter Security and Intrusion Prevention/4-FTD Next Generation Firewall/3-Threat Prevention/3-Implementing NGIPS.ts81.51MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/1-Firepower Threat Defense/1-Course Introduction.ts70.64MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/1-Firepower Threat Defense/2-Packet Flow - Overview.ts55.96MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/10-Turning Your System/1-Network Analysis - Part 1.ts80.64MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/11-Managing Administrators/1-User Account Managment.ts57.52MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/12-Connecting the FMC to Your AD/1-Identity Policy.ts55.85MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/2-Firepower Managent Center (FMC)/1-Installing a Cisco Firepower Managent Center (FMC) - Part 1.ts18.72MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/2-Firepower Managent Center (FMC)/2-Installing a Cisco Firepower Managent Center (FMC) - Part 2.ts23.85MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/3-Configuring the FMC/1-System Configuration.ts51.71MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/3-Configuring the FMC/2-Health Policies & Health Alerts.ts27.36MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/4-Installing FTD/1-Installing FTD on a Cisco 5500-x - Part 1.ts64.84MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/4-Installing FTD/2-Installing FTD on a Cisco 5500-x - Part 2.ts66.27MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/5-Cisco FTD 41009300/1-FXOS & Chassis Manager.ts53.45MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/6-Firepower Logical Objects/1-Firepower-FTD Objects - Part 1.ts74.45MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/1-FTD Interface Configuration - Part 1.ts49.49MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/2-FTD Interface Configuration - Part 2.ts19.15MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/7-Configuring FTD/3-FTD Routing Configuration.ts44.57MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/1-Access Control Policy - Part 1.ts77.02MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/2-Access Control Policy - Part 2.ts80.5MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/4-FTD PreFilter.ts61.03MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/5-Network Address Translation (NAT).ts89.15MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/6-Malware & File Policy.ts92.83MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/8-Configuring Policies/7-IPS Policy - Part 1.ts60.24MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/9-Discovering Users, Hosts & Aplications/1-Firepower Network Discovery.ts74.2MB
3-Perimeter Security and Intrusion Prevention/5-Firepower Threat Defense (FTD) - Part I/9-Discovering Users, Hosts & Aplications/2-Reporting & Task Management.ts77.28MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/1-Introduction/1-Course Introduction.ts9.53MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/1-External Authentication with RADIUS - Overview.ts10.95MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/2-Advanced Management & HA/3-FlexConfig - Overview.ts52.28MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/1-SSL Policy - Overview.ts42.5MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/2-SSL Policy - Configuration.ts59.15MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/3-Quality of Service (QoS).ts21.47MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/3-Advanced Policies/4-Correlation Policy.ts80.82MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/4-Virtual Private Networks/1-FTD VPN.ts21.93MB
3-Perimeter Security and Intrusion Prevention/6-Firepower Threat Defense (FTD) - Part II/4-Virtual Private Networks/2-Site-to-Site IPsec IKEv1.ts69.98MB
4-Cryptography and Virtual Private Networks/3-Dynamic Multipoint VPN (DMVPN)/1-Course Overview/1-Course Introduction.ts10.91MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/2-Secure Network Management/4-Logging.ts56.07MB
5-Infrastructure Security, Attacks and Mitigation/1-Network Management Security/3-Hardening Management Protocols/1-Securing SNMP.ts79.75MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/1-Introduction/1-Instructor Introduction.ts2.98MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/1-Network Device Architecture.ts18.46MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/2-Routing Protocol Authentication.ts33.3MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/3-Implementing Routing Protocol Authentication.ts48.15MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/4-Route Filtering.ts23.5MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/5-Control Plane Policing.ts62.67MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/6-Control Plane Protection.ts37.59MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/7-Implementing Control Plane Protection.ts58MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/8-Basic CPU Protection Mechanisms.ts30.56MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/2-Securing the Control Plane/9-Basic Memory Protection Mechanisms 2017.ts18.9MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/2-Management Plane Protection.ts9.57MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/4-The DHCP Protocol.ts45.92MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/5-DHCPv6.ts21.11MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/3-Securing the Management Plane/6-The DNS Protocol.ts53.48MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/6-Securing Layer 2/9-Storm Control.ts13.04MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/7-Securing Wireless Networks/1-Wireless Basics.ts42.04MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/7-Securing Wireless Networks/2-Wireless Security.ts51.89MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/1-Device Hardening - ASA.ts21.02MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/2-Device Hardening - IOS.ts32.05MB
5-Infrastructure Security, Attacks and Mitigation/4-Infrastructure Security/8-Security Best Practices/3-Cisco SAFE.ts47.02MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/1-IPv6 First Hop Security - Part 1.ts220.98MB
5-Infrastructure Security, Attacks and Mitigation/5-IPv6 First Hop Security vSeminar/2-IPv6 First Hop Security - Part 2.ts286.73MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/1-Stealthwatch Introduction/1-Introduction to Stealthwatch.ts79.04MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/1-Stealthwatch Introduction/3-Basic Stealthwatch System Installation - Part 2.ts81.19MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/2-Understanding SMC/1-SMC Configuration.ts83.56MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/3-Classifying Known and Unknown Network Entities/1-Host Groups and User Management.ts87.6MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/3-Classifying Known and Unknown Network Entities/2-Classification of Customer Environment.ts64.54MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/4-Security and System Maintenance/1-Detecting Indicators of Compromise (IoC) - Part 1.ts52.57MB
5-Infrastructure Security, Attacks and Mitigation/6-Security with StealthWatch using NetFlow/4-Security and System Maintenance/2-Detecting Indicators of Compromise (IoC) - Part 2.ts59.15MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/1-Introduction/1-Course Introduction.ts6.64MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/2-ISE Basics/1-Introduction to Cisco ISE.ts84.57MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/2-ISE Basics/3-Integrating with Active Directory.ts9.99MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/main/1-AAA Overview.ts37.08MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/main/2-AAA Components & Configuration.ts89.78MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/1-Authentication, Authorization _ Accounting (AAA) Overview.ts47.01MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/2-AAA Components _ Configuration.ts90.78MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/3-Introduction to Cisco Access Control Server (ACS).ts88.05MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/4-Introduction to Cisco Identity Services Engine (ISE).ts41.78MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/5- AD Integration.ts16.65MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/6-ISE Policies.ts94.25MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/3-Access Control - Administration/8-Administrative Access - ACS.ts74.93MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/2-Change of Authorization (CoA).ts27.95MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/3-Profiling Probes.ts40.45MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/4-Enabling Profiling.ts56.25MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/5-802.ts61.76MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/6-802.1x Deployment Modes.ts34.62MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/8-Implementing Wireless 802.ts61.73MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/4-Access Control Network/9-Guest Services.ts30.92MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/5-Scaling ISE Deployments/1-Distributed ISE.ts46.7MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/5-Scaling ISE Deployments/2-Deploying ISE Multinode.ts51.9MB
6-Access Control and Identity Services Engine/1-Identity Services Engine (ISE)/6-conclusion/1-Course Conclusion.ts3.53MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/1-course intro/1-Course Introduction.ts13.45MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/1-AD Integration.ts95.13MB
6-Access Control and Identity Services Engine/2-Advanced Identity Services Engine (ISE)/2-common confguration/4-Certificate Services.ts81.63MB
6-Access Control and Identity Services Engine/3-TrustSec/1-Introduction/1-Course Introduction.ts9.93MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/1-Introduction to TrustSec.ts87.38MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/2-Classification & SGT.ts65.81MB
6-Access Control and Identity Services Engine/3-TrustSec/2-TrustSec Overview & Operations/4-Enforcement & SGACL.ts61.9MB
6-Access Control and Identity Services Engine/3-TrustSec/3-Implementing TrustSec/3-TrustSec for Wireless Networks.ts46.78MB
7-Programmability and Automation/1-Network Programmability Foundation/1-Course Introduction/1-Course Introduction.ts6.57MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/1-Introduction to Network Programmability Foundation.ts59.95MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/2-Automation Tools.ts66.61MB
7-Programmability and Automation/1-Network Programmability Foundation/2-Programmability Overview/4-Distributed Git and GitHub.ts35.93MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/10-File Access.ts55.69MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/11-Classes.ts54.31MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/12-Modules and Packages.ts62.99MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/3-Data Types - Numbers.ts20.19MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/4-Data Types - Boolean.ts16.74MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/6-Data Types - Dictionary.ts69.29MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/7-Conditionals.ts64.48MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/8-Loops.ts52.75MB
7-Programmability and Automation/1-Network Programmability Foundation/3-Python Programming Basics/9-Functions.ts50.86MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/1-Data Formats - JSON.ts22.68MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/2-Data Formats - XML.ts64.99MB
7-Programmability and Automation/1-Network Programmability Foundation/4-Data Formats/3-Data Formats - YAML.ts31.45MB
7-Programmability and Automation/1-Network Programmability Foundation/5-APIs/1-Introduction to APIs.ts32.57MB
7-Programmability and Automation/1-Network Programmability Foundation/5-APIs/2-API Toolset.ts85.84MB
7-Programmability and Automation/1-Network Programmability Foundation/6-Course Conclusion/1-Course Conclusion.ts3.84MB
7-Programmability and Automation/2-cisco DNA/1-The Cisco DNA Architecture.ts28.52MB
7-Programmability and Automation/2-cisco DNA/10-DNAC Workflows, Device Discovery & LAN Automation.ts58MB
7-Programmability and Automation/2-cisco DNA/11-ISE Roles & DNAC Communication.ts24.16MB
7-Programmability and Automation/2-cisco DNA/12-ISE Standalone & Distributed Deployment.ts16.06MB
7-Programmability and Automation/2-cisco DNA/13-DNAC & ISE Integration.ts22.73MB
7-Programmability and Automation/2-cisco DNA/2-The Management Layer.ts21.67MB
7-Programmability and Automation/2-cisco DNA/3-Fabric Underlay Design Architecture Guidelines.ts40.06MB
7-Programmability and Automation/2-cisco DNA/4-Network Underlay Best Practices.ts34.46MB
7-Programmability and Automation/2-cisco DNA/5-Design Considerations for SD-Access Fabric Architecture.ts25.24MB
7-Programmability and Automation/2-cisco DNA/6-SD-Access Node Types.ts38.98MB
7-Programmability and Automation/2-cisco DNA/7-Campus Fabric Components.ts24.76MB
7-Programmability and Automation/2-cisco DNA/8-SD-Access Deployment Considerations.ts42.9MB
7-Programmability and Automation/2-cisco DNA/9-Fabric Deployment Models.ts10MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/1-Introduction/1-Course Introduction.ts10.66MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/1-Why Study SD-Access.ts29.09MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/2-The 2020 Global Networking Trends Report.ts23MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/2-Why Study SD-Access/3-The Future of Networking.ts30.8MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/1-Introduction to Intent-Based Networking (IBN).ts33.23MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/2-IBN in a Nutshell.ts31.95MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/3-Demystifying Software Defined-Access.ts26.97MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/3-Intent-Based Networking/4-Defining SD-Access.ts33MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/1-SD-Access & IBN.ts15.99MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/2-The What, How, and Why of SD-Access.ts55.92MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/4-The What, How and Why of SD-Access/3-Why Move to SD-Access.ts47.13MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/1-Overview of SD-Access Main Components.ts14.64MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/2-Cisco ISE.ts21.23MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/5-Overview of SD-Access Main Components/3-The Overlay Fabric.ts17.08MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/1-Document Repository for SD-Access.ts50.84MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/2-Hardware, Software, Licensing & Release Documentation.ts10.41MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/3-Exam-Related Documentation.ts9.87MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/6-Document Repository for SD-Access/4-How to Study for the CCIE.ts15.86MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/1-Introduction to the ISE Role in the SD-Access Architectur.ts30.28MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/2-ISE Deployment Models.ts30.28MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/7-Introduction to the ISE Role in the SD-Access Architecture/3-ISE Integration with SD-Access.ts23.66MB
7-Programmability and Automation/3-Introduction to Intent-Based Networking/8-Conclusion/1-Course Conclusion.ts20.83MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/1-Overview/1-Course Introduction.ts7.6MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/1-SMTP.ts41.04MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/2-ESA Overview.ts31.2MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/3-ESA Initialization - Part 1.ts64.05MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/4-ESA Initialization - Part 2.ts65.06MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/5-Email Pipeline.ts35.81MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/6-Access Tables - Part 1.ts67.14MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/2-Introduction to Cisco ESA/7-Access Tables - Part 2.ts80.71MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/3-The Policies/1-Introduction to Policies.ts83.4MB
8-Content Security and Advanced Threat Protection/1-Email Security Appliance/4-Advanced ESA Features/1-Message Filters.ts60.29MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/1-Overview/1-Course Introduction.ts6.69MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/1-Overview/2-Introduction to the Web Security Appliance.ts34.16MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/10-Time Restrictions & Quotas/1-Advanced Web Security.ts24.65MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/11-Integration with ISE/1-PxGrid.ts11.47MB
8-Content Security and Advanced Threat Protection/2-Web Security Appliance/12-Final Words from the Instructor/1-Course Conclusion.ts3.87MB