17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
PluralSight - Implementing Service Provider Security And Application Control
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes
Service provider security introduces many new tools and techniques, many of which are network-oriented, to secure the carrier’s network environment. In this course, Implementing Service Provider Security and Application Control, you'll learn how to secure SP networks and prioritize traffic using various techniques. First, you'll explore how to build the core network using multiple dual-stacked routing protocols, then harden it with basic security features. Next, you'll delve into developing a distributed denial of service (DDoS) defensive structure using BGP flowspec in conjunction with sinkholes and scrubbing centers. Lastly, you'll discover the three common MPLS quality of service (QoS) models commonly seen within service provider networks, prioritizing important flows while reducing the impact of malicious ones. When you're finished with this course, you'll have the skills necessary to analyze, harden, and optimize the security posture of service provider networks.
Homepage
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
4.2 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.4 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/1. Course Introduction, Expectations, and Topology Review.mp4
8.7 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/1. Course Introduction, Expectations, and Topology Review.vtt
5.3 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/2. Demo - Reviewing the OSPFv2 and LDP Core.mp4
8.8 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/2. Demo - Reviewing the OSPFv2 and LDP Core.vtt
4.6 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/3. Understanding LDP Session Protection and IGP Synchronization.mp4
7.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/3. Understanding LDP Session Protection and IGP Synchronization.vtt
4.5 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/4. Demo - Configuring LDP Session Protection.mp4
9.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/4. Demo - Configuring LDP Session Protection.vtt
4.6 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/5. Demo - Configuring IGP Synchronization.mp4
12.2 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/5. Demo - Configuring IGP Synchronization.vtt
5.4 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/6. Demo - Filtering LDP Label Advertisements.mp4
5.4 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/6. Demo - Filtering LDP Label Advertisements.vtt
3.2 KB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/7. Module Review.mp4
1.6 MB
~Get Your Files Here !/2. Enabling MPLS with LDP Optimizations/7. Module Review.vtt
1.3 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/1. Understanding the Customer Networks.mp4
4.6 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/1. Understanding the Customer Networks.vtt
2.7 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/2. Demo - Configuring IPv6 Multi-topology IS-IS.mp4
18.7 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/2. Demo - Configuring IPv6 Multi-topology IS-IS.vtt
8.4 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/3. Demo - Configuring Dual-stack OSPFv3.mp4
15.2 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/3. Demo - Configuring Dual-stack OSPFv3.vtt
7.6 KB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/4. Module Review.mp4
1.3 MB
~Get Your Files Here !/3. Designing Customer Networks with Dual-stacked IGPs/4. Module Review.vtt
1.2 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/1. Common Service Provider Security Techniques.mp4
5.6 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/1. Common Service Provider Security Techniques.vtt
4.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/2. Demo - Configuring Infrastructure ACLs (IACL).mp4
15.7 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/2. Demo - Configuring Infrastructure ACLs (IACL).vtt
7.7 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/3. Demo - Configuring Unicast Reverse Path Forwarding (URPF).mp4
10.5 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/3. Demo - Configuring Unicast Reverse Path Forwarding (URPF).vtt
5.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/4. Demo - Securing OSPF and BGP Sessions with TTL-security.mp4
12.7 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/4. Demo - Securing OSPF and BGP Sessions with TTL-security.vtt
6.1 KB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/5. Module Review.mp4
1.5 MB
~Get Your Files Here !/4. Applying Service Provider Security Techniques/5. Module Review.vtt
1.5 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/1. QoS Techniques - Classifying, Marking, Queuing, and Traffic C.mp4
10.8 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/1. QoS Techniques - Classifying, Marking, Queuing, and Traffic C.vtt
7.6 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/2. Comparing the Three MPLS QoS Models.mp4
11.5 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/2. Comparing the Three MPLS QoS Models.vtt
5.9 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/3. Demo - Implementing the Short Pipe QoS Model.mp4
25.9 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/3. Demo - Implementing the Short Pipe QoS Model.vtt
12.4 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/4. Demo - Implementing the Long Pipe QoS Model.mp4
21.4 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/4. Demo - Implementing the Long Pipe QoS Model.vtt
9.7 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/5. Demo - Implementing the Uniform QoS Model.mp4
22.1 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/5. Demo - Implementing the Uniform QoS Model.vtt
10.9 KB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/6. Module Review.mp4
1.4 MB
~Get Your Files Here !/5. Implementing MPLS Quality of Service (QoS) Models/6. Module Review.vtt
1.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/1. Securing Device Access with AAA - RADIUS and TACACS.mp4
7 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/1. Securing Device Access with AAA - RADIUS and TACACS.vtt
5.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/2. How Can We Protect Devices Themselves.mp4
2.7 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/2. How Can We Protect Devices Themselves.vtt
2 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/3. Demo - Protecting Devices with CPP and LPTS.mp4
13.5 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/3. Demo - Protecting Devices with CPP and LPTS.vtt
6.5 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/4. Validating BGP Advertisements with BGPsec.mp4
7 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/4. Validating BGP Advertisements with BGPsec.vtt
4.1 KB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/5. Course Review and Additional Resources.mp4
1.4 MB
~Get Your Files Here !/7. Fine-tuning a Service Provider Network’s Security Posture/5. Course Review and Additional Resources.vtt