|
|
|
|
LEADER |
02321nmm a2200289 u 4500 |
001 |
EB001913105 |
003 |
EBX01000000000000001076007 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Timms, Natalie
|
245 |
0 |
0 |
|a CCIE security v4.0
|b (video training)
|c Natalie Timms
|
246 |
3 |
1 |
|a Cisco certified internetwork expert security
|
260 |
|
|
|a [Place of publication not identified]
|b Cisco Press
|c 2014
|
300 |
|
|
|a 1 streaming video file (4 hr., 9 min., 57 sec.)
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a LiveLessons
|
500 |
|
|
|a Title from resource description page (viewed May 02, 2014)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9780133762532/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 000
|
520 |
|
|
|a "5 Hours of Video Instruction CCIE Security v4.0 LiveLessonsis a practical video tutorial for CCIE Security Certification mapping to both written and lab exam topics with concepts and solutions. This video series will be based on the major topic areas of the v4.0 lab exam topics and will include configuration and troubleshooting tips and examples based on a network topology that may be implemented by the reader in their own environment. Each session represents a major domain of security concepts and solutions implemented using Cisco security products and solutions. This video tutorial covers topics relevant to the new exam version 4.0 so it is updated to reflect major industry trends and the latest Cisco security offerings. It is designed to accompany the practical lab guide and also presents information relevant to the CCIE Security V4.0 Written Exam. Major sections are as follows: Lesson 1: Understanding the Network Design and Understanding Security Tools Lesson 2: Identity Management Lesson 3: Perimeter Security Methods Lesson 4: Intrusion Prevention and Content Security Lesson 5: Secure Access Solutions Lesson 6: System Hardening Lesson 7: Threat Identification and Mitigation"--Resource description page
|