دسته بندی

در حال حاضر محصولی در سبد خرید شما وجود ندارد.

پنل کاربری

رمز خود را فراموش کرده اید؟ اگر اولین بار است از سایت جدید استفاده میکنید باید پسورد خود را ریست نمایید.

کورس یادگیری کامل CCNP Enterprise 2020

دانلود INE CCNP Enterprise (New 2020)

35,000 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
افزودن به سبد خرید
خرید دانلودی فوری

در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

ویدئو معرفی این محصول

با مشاهده این کورس آموزشی از طریق انجام پروژه های واقعی و به زبانی بسیار ساده مطالب فراوانی را در رابطه با سیسکو CCNP یاد می گیرید.

عنوان اصلی : CCNP Enterprise (New 2020)

این مجموعه آموزش ویدیویی محصول موسسه آموزشی INE است که بر روی 30 حلقه دیسک ارائه شده و به مدت زمان 239 ساعت و 26 دقیقه در اختیار علاقه مندان قرار می گیرد.

در ادامه با برخی از سرفصل های درسی این مجموعه آموزش آشنا می شویم :


Network Infrastructure Features & Protocols (350-401 ENCOR):
Introducing The Network Time Protocol
Course Topics
IGMPv2 Part 3
IGMPv3
IGMP Snooping
Proxy Reporting
IGMP Snooping (Continued)
Bridged Multicast &IGMP Querier
Source-Only Streaming
Snooping & STP Reaction
IGMP Snooping Miscellaneous
IGMP Filtering
Introduction to Multicast
MLDP Introduction
MLD Snooping
PIM Overview
Multicast Addressing (L3)
Layer-2 Multicast MAC Addressing
Multicast Terminology
IGMP Introduction
IGMPv1
IGMPv2 Part 1
IGMPv2 Part 2
Overview Part 1
Joining the Shortest Path Tree Part 1
Joining the Shortest Path Tree Part 2
Review of the PIM Sparse-Mode Process Part 1
Review of the PIM Sparse-Mode Process Part 2
Designated Routers & Forwarders
PIM-Related & General Multicast Commands
Auto-RP Overview
Auto-RP RP-Candidates
Auto-RP Mapping-Agents
Auto-RP RP Of Last Resort
Overview Part 2
PIM-BSR Overview
PIM-BSR Election & Message Formats
Choosing an RP from among the RP-Set
IGMP MLDP Review
Overview of Multicast Routing Protocols
PIM Sparse-Mode Overview
Creating the Shared Tree Part 1
Creating the Shared Tree Part 2
Registering Sources Part 1
Registering Sources Part 2
LAN Switching Introduction
Rapid Spanning-Tree Protocol
Multiple Spanning-Tree Protocol
VLANs & Trunking
VLAN Trunking Protocol (VTP)
VTP Version 3
EtherChannel
Layer 2 EtherChannel Configuration
Layer 3 EtherChannel Configuration
Spanning-Tree Protocol
Optional Spanning-Tree Features
Rapid Spanning-Tree Protocol & MST Part 1
MST The Virtual-Bridge
IST Master & Root Port Selection
MST - PVST Simulation
Rapid Spanning-Tree Protocol & MST Part 2
Rapid Spanning-Tree Protocol & MST Part 3
RSTP Synchronization Process
RSTP Topology Changes
Multiple Spanning-Tree Protocol
MST Regions & BPDU Details
MST Path Selection & Configuration
MST Boundary Ports
Classic EIGRP
EIGRP Traffic Engineering with Summarization
EIGRP over DMVPN
EIGRP Stub Routing
EIGRP Route Filtering
EIGRP Named Mode
EIGRP Classic Metric Calculation
EIGRP Wide Metrics
EIGRP Traffic Engineering & Unequal Cost Load Balancing
EIGRP Classic Authentication
EIGRP Automatic Key Rotation
EIGRP Named Mode Authentication
EIGRP Summarization
Open Shortest Path First (OSPF) Protocol & Operation Overview
Traffic Engineering with OSPF Stub Areas
Configuring OSPF Not So Stubby Areas (NSSA)
Controlling NSSA Redistribution
Default Routing with OSPF NSSA
OSPF NSSA Translator Election & Forwarding Address
OSPF Path Selection
OSPF Authentication
OSPF Authentication Enhancements
OSPF Summarization Overview
Configuring OSPF Summarization
OSPF Single Area Configuration
OSPF Route Filtering
Troubleshooting OSPF Adjacencies
OSPF Areas and LSAs
OSPF Media Dependencies & Network Types
Configuring OSPF Network Types
OSPF Virtual Links
OSPF Stub Areas
Configuring OSPF Stub Areas
Core BGP Routing Part 1
Core BGP Routing Part 2
Applying BGP Policy
NLRI Advertisement Rules Part 1
NLRI Advertisement Rules Part 2
BPG Path Selection Rules Part 1
BPG Path Selection Rules Part 2
Course Introduction
Very High Throughput Wireless With 802.11ac ax
CAPWAP Introduction
Controller Discovery & Join Process
Controller Redundancy
Antenna Technology
Types Of Common Wi-Fi Antennas
WLAN Roaming
Minimizing Roaming Latency
Wi-Fi Location Based Services
Wi-Fi Security Overview
Wi-Fi Frequencies & Encoding
Web Authentication Configuration
Understanding 802.1x & EAP
roller 802.1x With EAP Configuration
Supplicant EAP Configuration
Course Conclusion
Radio Frequency Modulation
RF Signal Measurement Basics
The Rule Of 10s And 3s
Signal Strength Terminology
Mismatched Power
Wi-Fi Standardization
High Throughput Wireless With 802.11n
Network Address Translation (NAT)
High Availability Hot Standby Router Protocol
High Availability VRRP
High Availability GLBP
Supervisor and Route Processor Redundancy

2-Security (350-401 ENCOR):
Course Introduction
Network Device Architecture
Secure Network Management
The AAA Framework
AAA Configuration
SNMP, NTP & Logging
Control Plane Security
Control Plane Security - CPPr
Unicast Reverse Path Forwarding (URPF)
Course Prerequisites and Assumptions
Dynamic ACL Configuration
Monitoring Dynamic ACLs
Clearing & Extending Dynamic ACL Entries
Dynamic ACL Rules
Object Groups Intro
Simplification with Object Groups
Time-Based ACL Configuration & Monitoring
Logging Part 1
Course Agenda & Review Quiz
Accessing L4 L5 ACL Options
Matching on TCP UDP Port Numbers
Reflexive Access-Lists Intro
Reflexive ACL Configuration
Reflexive ACL Timeout Values
Monitoring Reflexive ACLs
Dynamic Access-Lists Intro
Control Plane Policing & Protection
REST Security Concepts & Mental Models
REST Security Authentication & Authorization
REST Security Request, Response and Logs
Course Introduction
Introduction To WSA Features
WSA Deployment Options
Introduction To WCCP
Introducing Cisco Cloud Web Security
Cisco CWS Connectors
Introduction To Malware
Viruses & Worms
Bombs, Horses & Backdoors
Exploits, Key Loggers, Rootkits & Ransomware
Categories Of Endpoint Protection
Email-Based Threats
Antivirus & Antimalware
Personal Firewall & HIPS
Email & Data Encryption
VPNs On Endpoints
The Email Pipeline
Cisco ESA Introduction & Features
Cisco ESA Deployment Options
Cisco ESA Processing Rules
Email Security Evasion Techniques
Email Encryption Techniques
Combatting Web-Based Threats Using Cisco WSA & CWS
Course Introduction
ASA Network Address Translation (NAT)
Configuring ASA Policies & NAT
Firewall Technologies
Access Lists
Zone-Based Firewall
Zone-Based Firewall Configuration
Cisco ASA Fundamentals
ASA Management
Configuring Basic ASA Settings
ASA Traffic Filtering
Cisco Network Access Security

3-Exploring Virtualization (350-401 ENCOR):
Course Introduction
Introduction To Virtualization
An Overview Of Hypervisors
Virtual Switches
Virtual Machine Resource Considerations
Virtualization Networking & Management Considerations
Virtualization Demonstration
Course Conclusion
Virtual Routing & Forwarding Instances (VRFs)
VRF Lite
VXLAN Overview
VXLAN BGP EVPN Verification
VXLAN Configuration & Verification Review Part 1
VXLAN Configuration & Verification Review Part 2
VXLAN Configuration & Verification Review Part 3
VXLAN BGP EVPN Configuration & Verification Review Part 1
VXLAN BGP EVPN Configuration & Verification Review Part 2
Asymmetric vs. Symmetric IRB
How Symmetric IRB Works Part 1
How Symmetric IRB Works Part 2
vPC & VXLAN BGP Traffic Flow Problems Part 1
vXLAN Terminology
vPC & VXLAN BGP Traffic Flow Problems Part 2
vPC Anycast VTEP
Configuring NVE Peer-Link-VXLAN
VXLAN Underlay Fabric Unicast High Availability
Bidirectional Forwarding Detection (BFD) Overview
Configuring BFD on NX-OS
VXLAN Underlay Fabric Convergence & Tuning PIM Convergence
PIM RP Redundancy
Anycast RP
Phantom RP
VXLAN Encapsulation
External Routing for VXLAN BGP EVPN, Border Leafs & Considerations
External Routing for VXLAN BGP EVPN Configuration
Basic VXLAN Workflow
VXLAN Configuration Prerequisites
VXLAN Flood & Learn on NX-OS Part 1
VXLAN Flood & Learn on NX-OS Part 2
VXLAN BGP EVPN Prerequisites
VXLAN BGP EVPN Configuration Steps
Locator ID Separation Protocol (LISP) Part 1
Locator ID Separation Protocol (LISP) Part 2
LISP Ingress Load Balancing Part 1
LISP IPv6 over IPv4
LISP to Non-LISP Interworking
IPsec VPN Overview
IPsec VPN Configuration with Crypto Maps
IPsec Verification & Troubleshooting
GRE over IPsec
IPsec Virtual Tunnel Interfaces (VTI)
IPsec over DMVPN
Course Introduction
VPNs, Tunneling & GRE
IPsec Overview
IPsec Tunneling
IPsec on the ASA
Implementing L2L IPsec VPN IOS-ASA
IOS Advanced IPsec Solutions
IPsec & IPv6

4-Monitoring & Troubleshooting Technologies (350-401 ENCOR):
Course Introduction
Flexible NetFlow Records
Flexible NetFlow Data Export
NetFlow Data Sampling
Configuring NetFlow Data Sampling
Course Conclusion
NetFlow Overview
NetFlow Versions
Original NetFlow Configuration & Monitoring
Original NetFlow Configuration Demonstration
Original NetFlow Export & Monitoring
Introducing Flexible NetFlow
Configuring Flexible NetFlow
Monitoring Flexible NetFlow
SNMP, RMON - Working With RMON (Video)
Course Introduction
Introduction To SNMP
SNMP Components
SNMP Versions
Configuring SNMPv1 v2c
Configuring SNMPv3
Verifying Your SNMP Configuration
Introduction To Syslog
Traffic Monitoring with SPAN
IP Service-Level Agreements
Course Introduction
RESTCONF Demonstration & Verification
Course Conclusion
Introduction To Data Models
Understanding YANG
Viewing YANG Models
An Introduction To NETCONF
NETCONF Implementation
NETCONF-YANG Demonstrations
Introduction to RESTCONF
Configuring RESTCONF

5-Understand Network Architectures (350-401 ENCOR):
Campus Network Architecture
Introduction to QoS
Classification using NBAR
Classification & Marking using MQC
Congestion Management Overview
Queuing (FIFO & WFQ) Part 1
Queuing (FIFO & WFQ) Part 2
Queuing (CBWFQ)
Fair-Queuing
Queuing (LLQ)
Congestion Avoidance (Overview)
Congestion Avoidance (WTD & WRED) Part 1
QoS Lab Components
Congestion Avoidance (WTD & WRED) Part 2
Congestion Avoidance (Policing & Shaping) Part 1
Congestion Avoidance (Policing & Shaping) Part 2
What is QoS Part 1
What is QoS Part 2
QoS Tools Part 1
QoS Tools Part 2
Classification & Marking Part 1
Classification & Marking Part 2
Classification & Marketing Part 3
QoS Overview
Hierarchical Queueing
Classification & Marking
Congestion Management
Congestion Avoidance
Traffic Shaping
Traffic Policing
Per-Tunnel QoS for DMVPN
Cisco Express Forwarding
SD-WAN Overview and Challenges
Solution Elements and Overview
Secure Control Plane Bringup
SD-WAN vEdge Secure Control Plane
SD-WAN Troubleshooting Control Plane Bring Up
Secure Data Plane Bringup
SD-WAN Infrastructure DDoS Protection
SD-WAN Security Policy and Services
Overlay Management Protocol (OMP)
vSmart Policies
SD-WAN Policy Architecture
SD-WAN Data policies
SD-WAN Application Aware Routing Policies
SD-WAN VPN membership policies
SD-WAN CFLOWD Templates
SD-WAN QoS Controls
SD-WAN TCP Optimization
SD-WAN Fragmentation and Path MTU Discovery
SD-WAN Configuration
Control Plane Troubleshooting
Data Plane Troubleshooting
Use Cases and Deployment Models
Cisco SDWAN Cloud onRamp Solution Overview
Cloud onRamp for IaaS
Cisco SDWAN Multi-Tenancy
vAnalytics
vManage REST API
INE - Cisco SD-Access & DNA Center-1
INE - Cisco SD-Access & DNA Center-10
INE - Cisco SD-Access & DNA Center-11
INE - Cisco SD-Access & DNA Center-2
INE - Cisco SD-Access & DNA Center-3
INE - Cisco SD-Access & DNA Center-4
INE - Cisco SD-Access & DNA Center-5
INE - Cisco SD-Access & DNA Center-6
INE - Cisco SD-Access & DNA Center-7
INE - Cisco SD-Access & DNA Center-8
INE - Cisco SD-Access & DNA Center-9
INE - Cisco SD-Access & DNA Center

6-Network Automation & Programmability (350-401 ENCOR):
Course Introduction
Loops & VLANs
Real World Advice to Create 100 VLANs Easily
Build a Multiple Switch Network
Initial Switch Configuration
Host Inventory
Multiple Switches & Multiple VLANs
Remove Enable Password
Backup Device Configs
Netmiko Introduction
First SSH Script
Lab Setup
Python3 SSH Script Using Netmiko
Python3 SSH Script Configuring Multiple Switches
File of Commands
Multiple Configs & Multiple Switches
Course Summary
Your First Automation Lab Part 1
Your First Automation Lab Part 2
Automating Switch Configuration
Python 3 Automation
Loops Introduction
For Loop Overview
Python Types
Course Introduction
Introduction To Cisco DNA Center
Architectural Elements Of Intent-Based Networking
Comparing Traditional Campus Networks Against DNA Center
Characteristics Of REST-based APIs
Overview Of Network Automation Tools
Encoding Data With JSON
Historical-To-Current Methods Of Network Management
Introduction To Network Management Automation
Network Management Automation Origination Points
Network Management Automation Protocols & Impact
Comparing Traditional Networks With Controller-Based Networking
Controller-Based SDN Architectures
SDNs Relationship To Management, Control & Data Planes
Introducing Northbound & Southbound APIs
Introduction
Basic Configuration Part 2
CLI Interaction
Variable Logic Part 1
Variable Logic Part 2
Event Detectors Part 1
Event Detectors Part 2
Counter
Enhanced Object Tracking
GOLD
Interface Counter
Advantages of EEM
IP SLA
NetFlow
None
online Insertion and Removal (OIR)
Resource
Redundancy Framework (RF)
RPC
Routing
SNMP Part 1
SNMP Part 2
EEM Components
Syslog
Watchdog System Monitor
Timer
CRON
Run CLI Command
Generate a CNS Event
Set or Modify a Counter
Switchover to Standby Processor
Send E-Mail
Manually Run a Policy
Applets vs Script
Publish an Application-Specific Event
Reload the IOS
Generate a SNMP Trap Part 1
Generate a SNMP Trap Part 2
Safe-TCL
ByteCode Language (BCL) Support
Supporting TCL
Sample Configurations Part 1
Sample Configurations Part 2
Sample Configurations Part 3
SNMP OID
Sample Configurations Part 4
Sample Configurations Part 5
EEM Versions
EEM Environment Variables
Cisco Built-in Variables
Basic Configuration Part 1

7-Network-Layer Technologies (300-410 ENARSI):
Routing Loops & Preventing Routing Loops by Changing Metric Value
Preventing Loops with Administrative Distance
Routing Loops with more than Two Routing Doamins & Per-Route AD Settings
Preventing Routing Loops by Filtering Using Tags
Introduction
BGP Default Routes Part 2
BGP Conditional Routing
Introduction to BGP Path Attributes
BGP Next-Hop Path Attribute
BGP Origin-Code Path Attribute
BGP AS-Path Attribute
BGP Best-Path Algorithm
Influencing eBGP Neighbors (AS-Path Prepending)
Influencing eBGP Neighbors (MED) Part 1
Influencing eBGP Neighbors (MED) Part 2
Address Families Part 1
Address Families Part 2
Injecting Routes into BGP Part 1
Injecting Routes into BGP Part 2
BGP Table Entries & Next-Hop Issues with iBGP Switching Part 1
BGP Table Entries & Next-Hop Issues with iBGP Switching Part 2
iBGP Full Mesh & Synchronization
BGP Default Routes Part 1
BGP Part-3 Introduction
Avoiding iBGP Full-Mesh Topologies (Route Reflectors) Part 2
Circumventing iBGP Full-Mesh Topologies (Confederations) Part 1
Circumventing iBGP Full-Mesh Topologies (Confederations) Part 2
BGP Route Aggregation Part 1
BGP Route Aggregation Part 2
Influencing iBGP Bestpath Selection (Weight)
Influencing iBGP Bestpath Selection (Local Preference)
BGP Filtering Techniques (Prefix-Based)
BGP Filtering Techniques (ORF)
BGP Filtering Techniques (AS-Path) Part 1
BGP Filtering Techniques (AS-Path) Part 2
BGP Filtering Techniques (Communities)
Avoiding iBGP Full-Mesh Topologies (Route Reflectors) Part 1
IPv6 Addressing Overview
IPv6 Routing Overview
IPv6 Routing over DMVPN
EIGRPv6
OSPFv3
IPv6 BGP
IPv6 over MPLS
IGP Redistribution Overview
Redistribution into EIGRP
OSPF Type-4 ASBR-Summary LSAs
Redistribution into OSPF
Redistribution Using Route-Maps & Distribution-list Switching
Setting Attributes for Redistributed Routes Using Route-Map
Path Manipulation with Redistribution
IPv6 IGP Redistribution
Policy-Based Routing
VRF-Lite
Bidirectional Forwarding Detection (BFD)
EIGRP Overview
EIGRP Topology Exchange over WAN
EIGRP Feasible Distance & Reported Distance
EIGRP Metric Manipulation Part 1
EIGRP Metric Manipulation Part 2
EIGRP Convergence Part 1
EIGRP Convergence Part 2
EIGRP Convergence Part 3
EIGRP Variance
ACL Review, Filtering Using ACLs
Introduction to Prefix-List Logic
EIGRP Neighborship & Parameters Overview
EIGRP Route Filtering Using IP prefix Lists
Introduction to Route Map Logic
EIGRP Route Filtering Using Route-Maps
EIGRP Route Summarization Part 1
EIGRP Route Summarization Part 2
EIGRP Default Route
EIGRP Path Manipulation
Named Mode EIGRP Configuration
EIGRP Hello Packets, Hello & Dead Intervals Timers
EIGRP Authentication Part 1
EIGRP Authentication Part 2
EIGRP Passive Interfaces & K-Values
EIGRP Static Neighbors and Router ID
EIGRP Neighbors over WANs
EIGRP Topology Table, Messages & Update Process
Introduction to OSPF
OSPF Type 2 LSA
OSPF Type 3 LSA
OSPF Database Exchange, OSPF Message Types, Neighbor States
OSPF Database Exchange, LSA Flooding, Periodic flooding
OSPF Metric Calculation for Intra-Area & Inter-Area Routes
OSPF Metric Tuning
OSPF route Filtering between Areas
OSPF Route Filtering into the Routing Table
OSPF Route Summarization
OSPF Default Routing, Introduction to Stub Areas
OSPF Neighbor Discovery, Hello Packet Parameters, Hello & Dead Intervals
OSPF Stub Areas Part 1
OSPF of Type-5 LSAs (Redistribution filtering)
OSPF Stub Areas Part 2
Introduction to Virtual Links, Need for Virtual Links
Configuring Virtual Links with & without Authentication
OSPF Path Manipulation
OSPF Router-ID & MTU Mismatch
OSPF Authentication Part 1
OSPF Authentication Part 2
OSPF Network Types Part 1
OSPF Network Types Part 2
OSPF Link State Database, Types of LSAs
OSPF Type 1 LSA
Core BGP Routing Part 1 - Core BGP
Core BGP Routing Part 2 - Core BGP
Applying BGP Policy - Core BGP
NLRI Advertisement Rules Part 1 - Core BGP
NLRI Advertisement Rules Part 2 - Core BGP
BPG Path Selection Rules Part 1 - Core BGP
BPG Path Selection Rules Part 2 - Core BGP
Introduction
eBGP Problem and Solution
BGP Neighbor States
State Transitions TCP Handshake Failure & Resets
Moving to OpenSent
Peering & Router - IDs
BGP Collisions
BGP DoS Example
TTL
Neighbor Failures
Neighbor Fall-Over
IGPs & BGP Comparison
Neighbor Fall-Over Problem & Solution
BFD
Indirect Link Failure with BFD
Quiz
iBGP & eBGP Overview
BGP Peering Overview
BGP Peering Sanity Checks Part 1
BGP Peering Sanity Checks Part 2
BGP Router-ID & Authentication
BGP Update-Source
BGP Parallel Links

8-VPN Technologies (300-410 ENARSI):
Introduction to MPLS
Label Distribution Reserved Labels & Prefix Aggregation
MPLS Loop Detection & TTL Propagation
MPLS Optional Features MPLS-id
MPLS Optional Features MTU
MPLS Optional Features Conditional Label Advertisement
Monitoring Basic MPLS Functionality
Debugging Basic MPLS LDP Connectivity
MPLS Terminology & Concepts
FECs & MPLS Label Structure
LDP Introduction Part 1
LDP Introduction Part 2
LDP Introduction Part 3
LDP Introduction Part 4
Label Distribution PHP Overview
Label Distribution PHP & Reserved Labels
Introduction
BGP within MPLS VPNs Part 2
BGP within MPLS VPNs Part 3
How does MPLS fit into MPLS VPNs
Configuring the MPLS Backbone
MPLS VPNs Configuring BGP
CE and PE Routers (Static Routing)
CE and PE Routers (RIP) Part 1
CE and PE Routers (RIP) Part 2
CE and PE Routers (EIGRP
CE and PE Routers (OSPF) Part 1
Lab Components
CE and PE Routers (OSPF) Part 2
CE and PE Routers (OSPF) Part 3
CE and PE Routers (OSPF) Part 4
CE and PE Routers (BGP) Part 1
CE and PE Routers (BGP) Part 2
CE and PE Routers (BGP) Part 3
Additional MPLS VPN Features BGP Cost Part 1
Additional MPLS VPN Features BGP Cost Part 2
Additional MPLS VPN Features Site of Origin (SoO)
MPLS Review Part 1
MPLS Review Part 2
Early History and Benefits
MPLS VPN Terminology
VRFs - A Review
MPLS VPN Functionality
BGP within MPLS VPNs Part 1
Course Introduction
DMVPN & IPv6
Implementing IPv6 DMVPN
DMVPN Dual Hub
Implementing DMVPN Dual Hub - Dynamic Multipoint VPN (DMVPN)
DMVPN Overview
DMVPN Routing
DMVPN Phase I
Implementing DMVPN Phase I
DMVPN Phase II
Implementing DMVPN Phase II
DMVPN Phase III
Implementing DMVPN Phase III
IPsec VPN Overview
IPsec VPN Configuration with Crypto Maps
IPsec Verification & Troubleshooting
GRE over IPsec
IPsec Virtual Tunnel Interfaces (VTI)
IPsec over DMVPN
Course Introduction
VPNs, Tunneling & GRE
IPsec Overview
IPsec Tunneling
IPsec on the ASA
Implementing L2L IPsec VPN IOS-ASA
IOS Advanced IPsec Solutions
IPsec & IPv6

9-Infrastructure Security (300-410 ENARSI):
Monitoring & Modifying ACL Hit-Counts
Course Introduction
Securing the CLI Limiting Source Requests
Securing the CLI Preventing Password Recovery
Securing the CLI Securing Privileged EXEC
Prevent Unauthorized Network Access Port-Security Violations
Prevent Unauthorized Network Access Other Port-Security Options
RootGuard & BPDUGuard
Using Access-Groups
What is a DoS attack & Disabling TCP UDP Small Servers
Limiting DCP & VTP
Hiding Source Addresses
Router & Switch Security Overview
Dynamic NAT
Port Address Translation NAT Overload
Ensure Accurate Time-Stamping of Logging Messages
Access Lists Overview
Access Lists Wildcarding
Standard ACLs
Implementing Standard ACLs on Multilayer Switches
Extended ACLs
Securing the CLI Securing the EXEC Process
Securing the CLI SSH versus Telnet
Course Prerequisites and Assumptions
Dynamic ACL Configuration
Monitoring Dynamic ACLs
Clearing & Extending Dynamic ACL Entries
Dynamic ACL Rules
Object Groups Intro
Simplification with Object Groups
Time-Based ACL Configuration & Monitoring
Logging Part 1
Logging Part 2
Course Agenda & Review Quiz
Accessing L4 L5 ACL Options
Matching on TCP UDP Port Numbers
Reflexive Access-Lists Intro
Reflexive ACL Configuration
Reflexive ACL Timeout Values
Monitoring Reflexive ACLs
Dynamic Access-Lists Intro
IPv6 Traffic filters (ACLs)
Course Introduction
Network Device Architecture
Secure Network Management
The AAA Framework
AAA Configuration
SNMP, NTP & Logging
Control Plane Security
Control Plane Security - CPPr
Unicast Reverse Path Forwarding (URPF)
IPv6 First Hop Security Part 1
IPv6 First Hop Security Part 2
IPv6 First Hop Security Part 3

10-Infrastructure Services (300-410 ENARSI):
Monitoring your network with SNMP
The DHCP Protocol
DHCPv6 Configuration
IP Service-Level Agreements
NetFlow

مشخصات این مجموعه :
زبان آموزش ها انگلیسی روان و ساده
دارای آموزشهای ویدیویی و دسته بندی شده
ارائه شده بر روی 30 حلقه دیسک
مدت زمان آموزش 239 ساعت و 26 دقیقه !
محصول موسسه آموزشی INE