Resource này bao gồm:

  • Course Overview
  • Threats, Vulnerabilities, Exploits and Mitigations
  • Common Threats to On-Prem
  • Common Threats in the Cloud
  • Common Security Vulnerabilities
  • Some Attack Mitigations
  • Introduction to Cryptography
  • Modern Cryptographic Solutions
  • Fundamentals of PKI
  • Using the PKI
  • IKE v1 vs IKE v2
  • VPN Options
  • Security Intelligence Auth, Sharing, Consumption
  • Endpoint Protections Social Engineering Attacks
  • Types of Social Engineering Attacks
  • Northbound and Southbound APIs of SDN
  • Python Scripts for Security Appliance API Calls
  • Intrusion Prevention versus Firewalling
  • Deployment Models for Network Security
  • NetFlow and Flexible NetFlow
  • Network Segmentation
  • DHCP Snooping – Network Security
  • DAI and IP Source Guard
  • Private VLANs
  • Storm Control
  • Port Security and VLAN Hopping Attacks
  • Hardening the Network Infrastructure
  • Access Control Policies
  • Management Options for Security Solutions
  • Configure AAA for Device and Network Access
  • Configure Secure Network Management
  • Configure and Verify the Site-to-Site VPN
  • Configure and Verify the Remote Access VPN
  • Debugging and Showing IPsec Verifications
  • Cloud Deployment and Service Models
  • Security Responsibilities in the Cloud
  • Miscellaneous Cloud Security Topics
  • Introducing Cisco Firepower Devices
  • Traffic Redirection and Capture Methods
  • Web Proxy Identity and Authentication
  • Compare ESA, CES, WSA
  • The WSA and ESA Architectures
  • Configure and Verify the WSA
  • Configure and Verify the ESA
  • Describe the Cisco Umbrella Solution
  • Configure and Verify Cisco Umbrella
  • EPP versus EDR and Cisco AMP
  • Miscellaneous Endpoint Security
  • Outbreak Control
  • Describe MDM
  • Describe an MFA Strategy
  • Endpoint Posture Assessment Solutions
  • Explain an Endpoint Patching Strategy
  • Guest Services and BYOD
  • Configure and Verify 802.1X, MAB, and WebAuth
  • Network Access with CoA
  • Device Compliance and Application Control
  • Explain Exfiltration Techniques
  • Benefits of Network Telemetry
  • Describe Various Cisco Security Products
Bạn phải đăng nhập hoặc đăng ký để có thể xem nội dung này !

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.