RAR-files |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.rar |
15,000,000 |
79C21B37 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r00 |
15,000,000 |
E8CCCDAA |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r01 |
15,000,000 |
9AB4E2F4 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r02 |
15,000,000 |
DD4434CA |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r03 |
15,000,000 |
4AE2D6E8 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r04 |
15,000,000 |
9FBAF993 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r05 |
15,000,000 |
3E367495 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r06 |
15,000,000 |
528239DC |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r07 |
15,000,000 |
3AFFC05A |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r08 |
15,000,000 |
6166E5C8 |
noledge-cisco-core-security-secure-network-access-visibility-and-enforcement.r09 |
10,148,413 |
5CDF3FFD |
|
Total size: |
160,148,413 |
|
|
Archived
files |
cisco-core-security-secure-network-access-visibility-enforcement\01_Course_Overview\01_Course_Overview.mp4
[2f3112ec60b0b28b]
|
3,717,066 |
F24B055A |
cisco-core-security-secure-network-access-visibility-enforcement\exercise_file.zip |
5,455,318 |
E6D5BA4B |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\16_Cisco_PxGrid.mp4
[903af33f58d62ecf]
|
7,458,995 |
C6F9CA66 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\13_Cisco_Stealthwatch.mp4
[22f5024d6d37d900]
|
6,777,944 |
277CC659 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\18_Putting_it_all_Together.mp4
[3b0ffd94afea623d]
|
4,404,369 |
EBF04A97 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\08_Information_That_Makes_up_Network_Telemetry.mp4
[adb4ef9c6eff5e89]
|
3,963,042 |
2B28CC51 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\07_Introduction_to_Network_Telemetry.mp4
[378fd9e7c3cd5b05]
|
7,128,310 |
1472EF0B |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\14_AnyConnect_Network_Visibility_Module_and_Stealthwatch_Cloud.mp4
[cb92277dc5c71d76]
|
5,692,342 |
7C1FB1B3 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\21_Controlling_Application_Traffic_Using_Policy_Maps.mp4
[5c5686ce4c34b498]
|
5,988,204 |
CF393767 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\22_Configuring_a_Switch_to_Capture_and_Send_Flows.mp4
[c2febb06ade1ca49]
|
27,214,139 |
A20C30DF |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\12_Module_Intro.mp4
[76abaec8a5c9fab6]
|
3,953,630 |
29BD9257 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\11_Putting_it_all_Together_for_Network_Telemetry.mp4
[fa981d16f381309f]
|
4,507,107 |
D4327F3D |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\17_Cisco_Umbrella_Investigate.mp4
[62144901fcd97d28]
|
3,994,589 |
AC354AE2 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\23_Stealthwatch_Overview_and_Module_Summary.mp4
[d0ba637273e0481b]
|
3,624,318 |
FB1C6089 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\15_Cognitive_Threat_Analytics_and_Encrypted_Traffic_Analytics.mp4
[4dbcbc1e1522f3b3]
|
5,974,281 |
08A2BCFA |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\20_Introduction_to_Ciscos_Application_Visibility_and_Control.mp4
[f2cc37da6776ab3b]
|
8,063,143 |
6B5B407A |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\10_Intro_to_NETCONF_RESTCONF_and_gRPC.mp4
[b715c5ea95a3a02a]
|
11,514,653 |
432821A9 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\24_Course_Summary.mp4
[ad81f88e348f0d6a]
|
2,357,027 |
B576A35F |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\09_Intro_to_Data_Models_and_YANG.mp4
[6f8442d8ed1e66f8]
|
11,038,715 |
E409CB7C |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\06_Module_Intro.mp4
[c94afd2c4b6770b0]
|
1,721,965 |
9DAB02B0 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry\19_Module_Intro.mp4
[2879280f0f261b40]
|
2,939,434 |
C66400E1 |
cisco-core-security-secure-network-access-visibility-enforcement\02_Explaining_Exfiltration_Techniques\02_Course_Introduction.mp4
[8236bdca84e7f770]
|
5,116,648 |
97A8740B |
cisco-core-security-secure-network-access-visibility-enforcement\02_Explaining_Exfiltration_Techniques\05_Exfiltrating_Data_Using_Email.mp4
[cc8ea9fc2a65d03e]
|
3,282,297 |
4551DC13 |
cisco-core-security-secure-network-access-visibility-enforcement\02_Explaining_Exfiltration_Techniques\03_Exfiltrating_Data_Using_DNS_NTP_ICMP_or_IRC.mp4
[3d96fde1797dd664]
|
10,560,852 |
21659CD2 |
cisco-core-security-secure-network-access-visibility-enforcement\02_Explaining_Exfiltration_Techniques\04_Exfiltrating_Data_Using_HTTPS_FTP_SFTP_SSH_or_SCP.mp4
[a43e59f8b75299]
|
3,692,573 |
34674F01 |
cisco-core-security-secure-network-access-visibility-enforcement\01_Course_Overview |
0 |
00000000 |
cisco-core-security-secure-network-access-visibility-enforcement\03_Describing_the_Benefits_of_Network_Telemetry |
0 |
00000000 |
cisco-core-security-secure-network-access-visibility-enforcement\02_Explaining_Exfiltration_Techniques |
0 |
00000000 |
cisco-core-security-secure-network-access-visibility-enforcement |
0 |
00000000 |
|
Total size: |
160,140,961 |
|
|