INE – Network Foundation Protection Control Plane

INE – Network Foundation Protection Control Plane
English | Size:2.08 GB
Category: Networking


Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Control Plane functionality and we will look at topics such as MAC address table, CAM table overflow, VTP, CDP, routing protocol authentication (RIP, OSPF, EIGRP, BGP), BGP TTL-Security, FHRP, passive interface, control plane policing, and control plane protection. [Read more…]

INE – Network Foundation Protection: Data Plane

INE – Network Foundation Protection Data Plane
English | Size: 1.88 GB
Category: Cisco | Networking | Security


Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Data Plane functionality and we will learn sophisticated features that influence and/or preserve the integrity of data forwarding on network devices: DHCP Snooping, Dynamic ARP Inspection, IP Source Guard, Unicast Reverse Path Forwarding, 802.1X, and Quality of Service to name a few. [Read more…]

PluralSight – Design A Data Protection Strategy With Microsoft Azure FEB2020 Update

PluralSight – Design A Data Protection Strategy With Microsoft Azure FEB2020 Update-REBAR
English | Size: 253.56 MB
Category: Tutorial

Understanding all the aspects of data protection and addressing can be complex. In this course, Design a Data Protection Strategy with Microsoft Azure, you will learn the foundational knowledge necessary to design a data protection strategy using Azure services. First, you will learn key considerations related to data protection. Next, you will discover encryption options for all stages of the data lifecycle. Finally, you will explore how to add performance and availability requirements for data in Microsoft cloud services. When you’re finished with this course, you will have the skills and knowledge of data protection needed to design a strategy for your organization’s data in Microsoft Azure. [Read more…]

Packt – GDPR and PSD2 Data Protection Compliance for the Financial Sector

Packt – GDPR and PSD2 Data Protection Compliance for the Financial Sector[Video]
English | Size: 4.13 GB
Category: Tutorial

The course is a complete A to Z, so we will cover everything that you need to know.In this way, we will first understand financial institutions challenges, PSD2 benefits for consumers, risks involved, security of payments and new types of service providers. [Read more…]

Linkedin – Learning Microsoft Cybersecurity Stack Advanced Identity and Endpoint Protection Updated August 2019-RiDWARE

Linkedin – Learning Microsoft Cybersecurity Stack Advanced Identity and Endpoint Protection Updated August 2019-RiDWARE
English | Size: 326.81 MB
Category: Tutorial


With the rise of the cloud, the traditional model of the network perimeter is dead identity is the new control plane. This course offers advanced techniques for identity and endpoint security with the Microsoft cybersecurity stack: Enterprise Mobility + Security (EMS) and Azure Active Directory Premium. Instructor Peter Zerger shows how to set up secure access to resources in any app, on any cloud, and from any device. Learn how to configure virtual-based security with Windows Defender Device Guard and Credential Guard secure email with Exchange Online ATP, control what happens after a breach with Advanced Threat Analytics, and protect the cloud with Azure Active Directory. Plus, find out how to use Windows Defender ATP and manage access to secure Azure resources using privileged access [Read more…]

INE-Advanced Malware Protection

INE-Advanced Malware Protection
English | Size: 384.58 MB
Category: Cisco | Networking | Security


This episode of the INE’s CCIE Security v5 Technology series focuses on Advanced Malware Protection (AMP) – an optional feature designed for continuous file monitoring, sandboxing and real-time malware blocking. By completing this course, you will know how to use and integrate AMP with web, email and firepower threat defense security appliances. [Read more…]