11-20-2024, 12:33 PM
Cisco Network Security: Core Security Concepts
Updated: 11/0224
Duration: 1h 56m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 222 MB
Skill Level: Intermediate | Genre: eLearning | Language: English
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers.This course corresponds to the security fundaments portion of the 200-301 CCNA exam.
Topics include
Security principles and terms
SIEM technology
Common security threats
Social engineering
Data loss prevention
Cryptographic concepts
Symmetric and asymmetric encryption
Hash algorithms
Network topologies, CAN, WAN, and SOHO
Securing a virtual environment
rapidgator.net:
k2s.cc:
Updated: 11/0224
Duration: 1h 56m | MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Size: 222 MB
Skill Level: Intermediate | Genre: eLearning | Language: English
Protect your network from common security threats. In this course, instructor Lisa Bock helps equip network administrators with a foundational understanding of security concepts in relationship to Cisco networks. Lisa covers essential security terms and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers.This course corresponds to the security fundaments portion of the 200-301 CCNA exam.
Topics include
Security principles and terms
SIEM technology
Common security threats
Social engineering
Data loss prevention
Cryptographic concepts
Symmetric and asymmetric encryption
Hash algorithms
Network topologies, CAN, WAN, and SOHO
Securing a virtual environment
rapidgator.net:
k2s.cc: