Cisco Cyber Security

Cisco Cyber Security

Paul Browning via YouTube Direct link

- Risk Assessment and Security documents

3 of 72

3 of 72

- Risk Assessment and Security documents

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cisco Cyber Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction to Network Security
  2. 2 - Common Security Threats
  3. 3 - Risk Assessment and Security documents
  4. 4 - Network Topologies
  5. 5 - Email-based threats
  6. 6 - Web-based threats
  7. 7 - Security and Cisco Routers: An introduction
  8. 8 - Password Management
  9. 9 - Password Management for remote connections
  10. 10 - Understanding Privilege Levels
  11. 11 - Introduction to Cisco Configuration Professional CCP
  12. 12 - CCP: In-depth
  13. 13 - Introduction to AAA
  14. 14 - Configuring AAA
  15. 15 - Configuring AAA Part 2
  16. 16 - Cisco Secure ACS
  17. 17 - Zoom-in: RADIUS and TACACS+ protocols
  18. 18 - AAA: Authorization and Accounting
  19. 19 - Role-Based Access Control RBAC using Privilege Levels
  20. 20 - Role-Based Access Control RBAC using Parser Views
  21. 21 - Integration of Active Directory with AAA
  22. 22 - Authentication and Authorization using Cisco ISE
  23. 23 - 802.1X
  24. 24 - BYOD
  25. 25 - Introduction to ACLs
  26. 26 - Wildcards and Network Summarization
  27. 27 - Implementing ACLs
  28. 28 - Implementing ACLs through CCP
  29. 29 - Using Object groups with ACLs
  30. 30 - Implementing Password Policies
  31. 31 - Network Management Protocols Part 1
  32. 32 - Network Management Protocols Part 2
  33. 33 - Restricting VTY Access and SNMP Overview
  34. 34 - Logging, NTP and Cisco IOS Resilient Configuration
  35. 35 - Common Layer 2 Attacks
  36. 36 - Configuring switch ports and VLANs
  37. 37 - General Layer 2 best security practices
  38. 38 - Port Security Part 1
  39. 39 - Port Security Part 2
  40. 40 - STP Security
  41. 41 - DHCP Snooping and DAI
  42. 42 - Introduction to Firewalls
  43. 43 - Introduction to NAT
  44. 44 - Introduction to Cisco IOS Zone-based Firewall ZFW
  45. 45 - Configuring Cisco IOS Zone-based Firewall via CLI Part 1
  46. 46 - Configuring Cisco IOS Zone-based Firewall via CLI Part 2
  47. 47 - Configuring Cisco IOS Zone-based Firewall via CCP
  48. 48 - Configuring Cisco IOS NAT Part 1
  49. 49 - Configuring Cisco IOS NAT Part 2
  50. 50 - Intro to Cisco ASA: modes, HA, contexts, FW services
  51. 51 - Configuring the Cisco ASA via CLI Part 1
  52. 52 - Configuring the Cisco ASA via CLI Part 2
  53. 53 - Configuring the Cisco ASA via ASDM
  54. 54 - NAT on the ASA
  55. 55 - Network Object NAT
  56. 56 - Twice NAT
  57. 57 - Introduction to Cryptography Part 1
  58. 58 - Cisco IPS Solutions
  59. 59 - Introduction to Cryptography Part 1
  60. 60 - Introduction to Cryptography Part 2
  61. 61 - Introduction to Virtual Private Networks VPN
  62. 62 - IPSec VPN Part 1
  63. 63 - IPSec VPN Part 2
  64. 64 - Configuring IOS IPSec Site-to-Site VPN
  65. 65 - Verifying IOS IPSec Site-to-Site VPN
  66. 66 - IPSec site-to-site VPN with PSK on ASA
  67. 67 - Verifying IPSec L2L VPN on the ASA
  68. 68 - SSL VPN
  69. 69 - Configuring Clientless SSL VPN on ASA
  70. 70 - Configuring AnyConnect SSL VPN on ASA
  71. 71 - Identify Endpoint Posture Assessment
  72. 72 - Hairpinning, Split Tunneling, Always-on, NAT Traversal

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.