PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.02.Securing EIGRP.mp4 |
24.8 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/01.Course Overview/01.01.Course Overview.mp4 |
3.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.01.Course Introduction.mp4 |
5.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.02.Cisco SAFE and CVDs.mp4 |
5.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.03.Architectures.mp4 |
6.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.04.Designing & Deploying Firewall Solutions.mp4 |
8.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.05.Designing & Deploying IPS Solutions.mp4 |
7.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/02.Comparing Network Security Solutions & Deployment Models/02.06.Additional Integrations for Firepower and ASAs.mp4 |
4.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/03.Describing Components, Capabilities, & Benefits of NetFlow/03.01.Module Intro.mp4 |
1.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/03.Describing Components, Capabilities, & Benefits of NetFlow/03.02.NetFlow Introduction.mp4 |
5.7 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/03.Describing Components, Capabilities, & Benefits of NetFlow/03.03.NetFlow Benefits.mp4 |
8.2 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/03.Describing Components, Capabilities, & Benefits of NetFlow/03.04.NetFlow Versions & Flow Standards.mp4 |
7.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/03.Describing Components, Capabilities, & Benefits of NetFlow/03.05.Cisco Stealthwatch.mp4 |
7.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.01.Mod Intro, Physical Security, & the 3 Planes of A Device.mp4 |
6.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.02.Telnet, HTTPS, SSH, & HTTPs.mp4 |
7.1 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.03.AAA.mp4 |
3.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.04.RADIUS & TACACS+.mp4 |
11.8 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.05.SNMP.mp4 |
4.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.06.Additional Protocol Security.mp4 |
7.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/04.Securing the Management Plane/04.07.Management Plane ACLs & Module Summary.mp4 |
5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.01.Module Intro.mp4 |
3.8 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/jgtiso.nfo |
6 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.03.Securing RIP.mp4 |
10.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.04.Securing OSPF.mp4 |
13.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.05.Securing BGP.mp4 |
12.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.06.Access Control Lists.mp4 |
9.2 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.07.Creating Extended ACLs.mp4 |
11.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.08.Applying ACLs and Other ACL Types.mp4 |
13.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.09.Policy Maps, NBAR, URPF, & TCP Intercept.mp4 |
12.2 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/05.Securing the Control Plane and Data Plane on Cisco Routers/05.10.Control Plane Policing & Module Summary.mp4 |
8.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.01.Module Intro.mp4 |
2.1 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.02.Securing Spanning Tree Protocol.mp4 |
12.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.03.Securing Virtual Trunking Protocol.mp4 |
13.2 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.04.Port Security.mp4 |
9.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.05.DHCP Snooping.mp4 |
9.1 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.06.Dynamic ARP Inspection.mp4 |
4.1 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.07.Segmentation and Private VLANs.mp4 |
23.9 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.08.Protecting Against Segmentation Attacks & Traffic Filtering at Layer 2.mp4 |
10.2 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/06.Securing the Control Plane and Data Plane on Cisco Switches/06.09.Storm Control.mp4 |
3.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.01.Module Intro.mp4 |
1.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.02.Wireless Security Overview.mp4 |
6.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.03.Adding Encryption to Wireless LANs.mp4 |
7.8 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.04.Configuring WPA2 Enterprise.mp4 |
11.5 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.05.Securing the Management Plane on a Wireless LAN Controller.mp4 |
10.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/07.Configuring Wireless LAN Controller Device Hardening Methods/07.06.Course Summary.mp4 |
2.3 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/02/comparing-network-security-solutions-and-deployment-models-slides.pdf |
1.6 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/03/describing-components-capabilities-and-benefits-of-netflow-slides.pdf |
751 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/04/securing-the-management-plane-slides.pdf |
805 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/04/demos/M4/HTTP.pcap |
277 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/04/demos/M4/https.pcapng |
3 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/04/demos/M4/ssh.pcap |
31 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/04/demos/M4/TELNET Password.pcap |
744 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/securing-the-control-plane-and-data-plane-on-cisco-routers-slides.pdf |
1 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/ACLs |
290 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/BGP |
894 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/EIGRP |
1 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/Initial Config |
845 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/OSPF |
1 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/OSPF with and without hashing.pcap |
634 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/05/demos/M5/RIP |
931 B |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/06/securing-the-control-plane-and-data-plane-on-cisco-switches-slides.pdf |
1.4 MB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/06/demos/M6/Private VLANs |
2 KB |
PLURALSIGHT.CISCO.CORE.SECURITY.NETWORK.SECURITY.FUNDAMENTALS-JGTiSO/Exercise_file/07/configuring-wireless-lan-controller-device-hardening-methods-slides.pdf |
645 KB |