Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCNP SECURITY -SCOR-350-701
CCNA CCNP CCIE – Learning Roadmap
Cracking the Code Interview Insights and Exam Preparation for Cisco Certifications (12:58)
Mastering Networking A Comprehensive CCNA, CCNP, CCIE Learning Roadmap (14:45)
Hands-On LearningL The Crucial Role of Virtual Labs in CCNP and CCIE Studies (16:08)
CCIE Aspirations A Step-by-Step Guide to CCIE Preparation and Success (13:44)
Cisco Certifications
ABout Cisco (1:11)
Cisco Certification Updates (11:15)
Cisco Re-Certification (0:52)
CCNP Certifications (0:54)
005 CCIE Certifications (1:55)
006 Cisco Certification Migration Options (5:55)
Required Exams for CCNP (2:30)
Workbooks - Images Download Links
CCNP SCOR - 350-701
CCNP Security Certifications (7:19)
CCNP SCOR-350-701 (1:02)
SCOR-Contents (6:58)
Virtual Labs - GNS3 Platform
Cisco Lab Options (7:35)
Supported Virtual Images - GNS3- EVE-ng (7:39)
About GNS3 (3:44)
Installing GNS3 on Windows (6:39)
GNS3 - Adding IOS Images (5:57)
Default Topology- IOS Routers -Initial Configurations (5:12)
IOS Default Topology (9:18)
Connecting GNS3 Topology to Host Computer (6:02)
GNS3- VMWARE Integration (9:16)
GNS3 - IOSv L2-L3 Configuration Steps (5:54)
GNS3 - ASAv Setup (4:17)
GNS3- IOU- L2-L3 Configuration Steps (2:38)
Virtual Labs - EVE-NG Platform
001 EVE-NG Virtual Platfrom (6:31)
EVE-nG Professional License (6:34)
IOL Devices - EVE-nG (7:17)
Upload SD-WAN Images - EVE-NG (8:17)
Adding Viptela Devices - EVE-NG Lab (5:50)
ASA - EVE-NG (7:08)
Windows - EVE-NG (10:10)
ASA 8.4 Image - EVE-NG (5:30)
Connecting WIndows PC- EVE-Topology (11:57)
Connecting WIndows PC - Internet (9:27)
CSR1000v - EVE-NG (6:30)
Network Security Concepts
Network Security Terminology (6:07)
Goals of Network Security (9:30)
Understanding Threat Types -Mitigation (8:55)
Assets - Classification of Assets (6:15)
Classify CounterMeasures (3:56)
Classify Vulnerabilities (2:27)
Network Security - Design Principles (10:24)
Common Security Attacks - Mitigation
Motivations Behind Network Attacks (3:04)
Social Engineering Attacks (3:31)
Phishing Attacks (3:44)
Social Engineering - Phishing Mitigation (3:45)
Denail of Service Attacks - DoS (4:47)
Distributed Denial of Service Attacks - DDoS (3:50)
Spoofing Attacks (3:40)
Spoofing Attacks - Mitigation (3:52)
Man in the Middle Attacks - MiTM (2:10)
Password Attacks (5:08)
Password Attacks - Mitigation (3:44)
Reflector Attacks (1:51)
Amplification Attacks (2:06)
Reconnaisance Attacks (5:14)
Reconnaisance Attacks - Mitigation (1:57)
Malicious Codes - HACKING
Malicious Codes - VIRUS (2:05)
Malicious Codes - WORMS (0:57)
Malicious Codes - TROJAN HORSES (1:12)
Hacking (1:27)
Hackers - Script Kiddies (1:23)
Malware services Darknet (0:50)
Threat Defense Technologies
What is Firewall (7:42)
Next Generation Firewalls (5:30)
AAA- Network Security (10:37)
Virtual Private Networks (4:12)
Cisco Traffic Telemetry methods (3:38)
Intrusion Prention System - IPS (4:22)
LABS VIRTUAL - GNS3
Cisco Lab Options (7:35)
About GNS3 (3:44)
Installing GNS3 on Windows (6:39)
GNS3 - Adding IOS Images (5:57)
Default Topology- IOS Routers -Initial Configurations (5:12)
IOS Default Topology (9:18)
Connecting GNS3 Topology to Host Computer (6:02)
GNS3- VMWARE Integration (9:16)
GNS3 - IOSv L2-L3 Configuration Steps (5:54)
GNS3 - ASAv Setup (4:17)
GNS3- IOU- L2-L3 Configuation Steps (2:38)
Network Infrastructure Protection
Network Infrastructure Protection (5:20)
Identify Network Planes (8:17)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
Remote Management - TELNET -SSH
Inband vs OutBand (7:02)
Remote Access - Telnet (5:55)
Remote Access - SSH (9:18)
Cisco Telemetry Services
Cisco Traffic Telemetry methods (3:38)
Device-Network Events Logging (9:39)
Syslog - Terminal Logging (6:48)
Network Time Protocol (7:01)
NTP -Stratum Value (3:40)
LAB - NTP - Configuration (8:45)
Control Plane Security
Control Plane - Possible Threats (8:32)
Routing Protocol Authentication (11:50)
Control Plane Policing -CoPP (7:11)
Class Map -Policy Map -Hierarchy (5:23)
CoPP_ Configuration Example (12:14)
Layer 2 Security - Basic Options
Switch Security - Overview (2:09)
Disable Unused Ports (1:27)
Dynamic Trunking Protocol (8:17)
DTP Vulnerabilities - Mitigation (2:23)
VLAN Hopping Attack- Mitigation (4:49)
CDP Overview (17:42)
LLDP Overview (2:34)
CDP-LLDP- Vulnerabilities - Mitigation (2:12)
Layer 2 Security - Advanced
MAC Flooding Attack - Port Security (11:57)
MAC Spoofing Attack - Port Security (7:26)
Port Security - Configuration (11:03)
Spanning-tree Portfast (7:10)
What is Native VLAN (8:10)
DHCP Spoofing Attack- DHCP Snooping (8:13)
DHCP Snooping - Configuration (16:06)
DHCP Starvation Attack - Mitigation (1:50)
ARP Spoofing Attack - Dynamic ARP Inspection -DAI (12:18)
Dynamic ARP Inspection - Configuration (11:35)
Protected Ports - Private VLAN Edge (2:54)
Private VLAN - Overview (9:23)
Private VLAN - Configuration (4:55)
Private VLAN - Configuration Lab (19:34)
Protected Ports-Private VLAN Edge (2:30)
Firewalls - Introduction
What is Firewall (7:42)
Statefull packet Filtering (8:05)
Stateless Packet Filtering (3:31)
Application Level Gateways - Proxy Servers (5:10)
Next Generation Firewalls (5:30)
Which Firewall - Vendors (6:23)
Cisco ASA Fiewall
Cisco StateFull Firewalls - IOS-ASA (2:50)
ASA-Supported Features-Part 1 (8:47)
ASA-Supported Features-Part 2 (10:33)
ASA - Compare models (6:44)
Cisco ASA -CLI
Manage Cisco ASA-CLI-GUI (2:35)
ASA Basic CLI Modes - Commands (3:35)
ASA Security levels (9:52)
ASA INterface configuration (4:54)
ASA Security Policies - Default (10:47)
ASA - Routing (5:16)
ASA - ACL - Object Groups
ASA ACLs - Overview (9:22)
ACL ACLs- Basic Example (6:39)
Traffic between Same Security level (2:37)
ACL Object-Groups (10:16)
ACL Object-Groups - LAB (11:42)
ASA - Network Address Translation
Public-Private IP (5:13)
What is NAT (2:34)
NAT Types (5:30)
Dynamic NAT on ASA (10:28)
Dynamic PAT on ASA (4:42)
Dynamic PAT using Exit Interface (4:37)
Dynamic NAT-PAT Combination (2:29)
Static NAT on ASA (11:41)
Static PAT on ASA (11:09)
Zone Based Firewall - ZBF
IOS - Zone based Firewall (3:16)
ZBF- Configuration overview (3:45)
ZBF- Security zones (3:01)
ZBF - Default Traffic flow (3:26)
Classmap -Policymap -Hierarchy (5:23)
ZBF - Classify Traffic using Class-maps (5:56)
ZBF- Class-map Configuration (4:41)
ZBF- Policy Map- Zone Pairs (10:44)
Cryptography
What is Cryptography (3:16)
Goals of Cryptography (3:23)
What is Hashing How it works (2:32)
Hashing with HMAC (2:52)
What is Encryption - Decryption (1:29)
Encryption Algorithms - Symmetric vs Assymetric (5:02)
Cryptanalysis - Attacks (3:59)
Assymetric Encryption - Drawbacks (2:49)
Public Key Infrastructure (3:52)
Virtual Private Networks - VPN
VPN-Introduction (5:09)
VPN Types (3:49)
VPN Logical Topologies (1:25)
VPN Default Lab Setup- Routers (5:22)
IPSEC - Internet Protocol Security
what is IPSEC (2:48)
IPSEC Security Services (6:53)
IPSEC Modes - Tunnel vs Transport (5:29)
IPSEC Site to Site VPN
How IPsec VPN works (5:19)
Step-1 Interesting Traffic Configuration (3:02)
Step-2 IKE Phase-1 (7:36)
Step-3- IKE - Phase 2 (8:30)
IKE Phase -2 Configuration- Verification (6:56)
Remote VPN- SSL VPN
Remote Access VPN (2:32)
What is SSL - TLS (3:06)
How SSL-TLS Works (7:53)
What is SSL VPN (4:17)
SSL VPN Modes (6:02)
AAA - Authentication-Authorization-Accounting
AAA- Network Security (10:37)
AAA - Components (3:50)
AAA - Protocols -TACACS- RADIUS (7:35)
AAA - Cisco Authentication Servers (3:51)
AAA - Authentication
AAA Authentication - Device Access (2:54)
Authentication - Local Database (9:54)
AAA - External Servers (3:19)
LAB- Authentication - TACACS (11:34)
AAA Authorization
Authorization - Device Access (3:27)
IOS Privilege Levels (8:48)
LAB -Local Authorization- Privilege Levels (14:23)
IOS Privilege Levels - Limitations (4:57)
Role based CLI Access - RBAC (5:33)
RBAC - Views Types (4:22)
LAB1- RBAC Views (9:44)
LAB2 - Modify RBAC Views (3:39)
LAB3 - RBAC Views (5:42)
LAB4 - RBAC SuperViews (5:13)
Web Based Attacks - Web Security
Web Access-Possible Threats (3:51)
Web Based Attacks -Threats (4:40)
Web Attacks-Examples (9:58)
Web Security Solutions (4:33)
Cisco WSA - Web Security Appliance
Cisco Web Security-WSA-CWS (5:19)
What is WSA (8:48)
WSA-How it Works (5:25)
WSA Deployment Modes (5:33)
WSA Models-Physical-Virtual (4:42)
WSA Licensing Options (7:23)
Cisco ESA - Email Security Appliance
Email Based Threats (2:26)
Cisco Email Security - ESA - CES (3:13)
Intrusion Prevention System - IPS
What is Intrusion ? (1:53)
Intrusion Prevention System - IPS (2:38)
IDS vs IPS (1:59)
Host based IPS vs Network Based IPS (5:34)
IPS Deployments - Inline vs Promiscuous (3:20)
Cisco IPS Solutions (4:56)
IPS Threat Detection Methods (6:40)
Signature Alarm Types (3:17)
IPS Signature Actions (3:29)
IPS Evasion Methods - Countermeasures (5:54)
What is Network Mangement ?
What is Network Management (8:04)
Past-Present Methods of Network Management - PART 1 (13:54)
Past-Present Methods of Network Management - PART 2 (7:08)
Simple Network Management Protocol - SNMP (18:05)
What is Network Automation ?
Challenges - Traditional Management (11:12)
Network Automation- Goals (15:39)
Types of Network Automation (6:19)
What can be Automated- PART 1 (11:59)
What can be Automated - PART 2 (8:33)
Impact of Network Automation (8:19)
Software Defined Networking - SDN & SDN Controllers
Automation Origination Points (8:20)
SDN- Software Defined Networking (14:30)
SDN Controllers (8:43)
Networks Managed by SDN Controllers (12:56)
SDN-Control - Mangement - Data Planes
Identify Network Device Planes (2:44)
Identify Network Device Planes (1:40)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
SDN- Management Plane (7:07)
SDN - Control Plane- Data Plane (5:58)
SDN Models - Architecture
SDN - Imperative Model (4:50)
SDN - Declarative Model (7:25)
SDN-Network Design Requirments (8:40)
Underlay Networks (7:18)
Overlay Networks (6:40)
SDN Fabric (6:05)
Application Programming Interface - API
API - Application Programming Interface (11:17)
API - Types (4:05)
API - with SDN Networks (8:43)
NorthBound API (8:49)
SounthBOund API (7:56)
Cisco Devnet - SandBox
Cisco DEVNET (4:39)
DevNET Certifications (4:40)
DevNET SandBox (6:13)
Sandbox LABS (8:03)
Sandbox Lab Access-Reservations (3:19)
Cisco DNA Center
Cisco DNA Center (15:57)
DNA Center Appliance (4:06)
DNA Center- What can do - PART 1 (11:28)
DNA Center- What can do - PART 2 (13:05)
Web Service API - REST API
Web Service API (7:52)
Web Service API - Commonly Used (7:43)
REST API (8:14)
Network Automation Tools
Config MGMT Tools (6:24)
Config MGMT Tools - Capabilities (8:53)
Config-MGMT tools - Similarities (5:53)
Master - Agent (5:30)
Agentbased- Agentless (6:57)
Push-Pull Model (10:19)
Configuration Files (5:29)
PUPPET Config Management Tool
PUPPET-Tool (2:51)
Puppet Master-Agent-Database (3:28)
Puppet-Manifest (4:51)
Puppet-Module-Forge (5:57)
Puppet- PULL Model Steps (4:06)
Puppet Agent-Agentless (3:07)
CHEF Config Management Tool
025 CHEF- Config MGMT Tool (6:10)
026 CHEF-Termonology (7:29)
ANSIBLE Config MGMT Tool
ANSIBLE-Tool (7:38)
ANSIBLE-Control Station (3:10)
ANSIBLE -PLayBook-Inventory (5:09)
ANISBLE - Templates-Variables (6:31)
JSON DATA Encoding
API Data Formats (7:43)
JSON Overview (7:33)
JSON Data Types (6:40)
JSON Syntax Rules (2:48)
JSON Data Interpretation (6:52)
Distributed Denial of Service Attacks - DDoS
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock