- Видео 166
- Просмотров 117 628
Mushraf Mustafa
Швеция
Добавлен 21 май 2015
Cisco Platforms and APIs - CISCO SCOR
SCOR Cisco Training Series Section 32:
In this module you will learn:
Cisco Platforms with regard to Programmatic APIs
API Explorer
Using Cisco FMC REST API
Basic Python Scripts for Automation
Cisco FMC and Python
Cisco FMC and Python Example
Thank you! Hope you liked my videos on CISCO SCOR Training, This is the last video of this training module. Comment which series you would like next and please consider subscribing to channel.
In this module you will learn:
Cisco Platforms with regard to Programmatic APIs
API Explorer
Using Cisco FMC REST API
Basic Python Scripts for Automation
Cisco FMC and Python
Cisco FMC and Python Example
Thank you! Hope you liked my videos on CISCO SCOR Training, This is the last video of this training module. Comment which series you would like next and please consider subscribing to channel.
Просмотров: 154
Видео
Network Programmability and Automation - Cisco SCOR
Просмотров 1242 года назад
SCOR Cisco Training Series Section 32: In this module you will learn: Network Programmability and Automation Scenarios Use of Network Automation Network Automation Scenarios Management Plane Open Source Tools and Enterprise Platforms Network Programmability Technology Thank you! Please consider Subscribing to channel.
Software Defined Networking Concepts - Cisco SCOR SDN
Просмотров 1112 года назад
SCOR Cisco Training Series Section 32: In this module you will learn: Software Defined Networking Concepts in detail Traditional versus Software-Defined Networks SDN Building Blocks Open Source Software Programmable Infrastructure DevOps Cisco ACI Cisco SDN and Network Programmability Technologies Cisco SDN Use Case Thank you! Please consider Subscribing to channel.
Cisco Stealthwatch Cloud for Public/Private Cloud Monitoring
Просмотров 2092 года назад
SCOR Cisco Training Series Section 30: In this module you will learn: Cisco Stealthwatch Cloud for Public Cloud Monitoring Amazon Web Services Architecture Google Cloud Platform Architecture Microsoft Azure Architecture Cisco Stealthwatch Cloud for Private Network Monitoring Thank you! Please consider Subscribing to channel.
Cisco OAuth and OAuth Attacks - Cisco Cloud
Просмотров 632 года назад
SCOR Cisco Training Series Section 29: In this module you will learn: Cisco OAuth and OAuth Attacks in Detail Cisco OAUth and OAuth Attack Examples Thank you! Please consider Subscribing to channel.
Cloud Access Security Broker - Cisco Cloud
Просмотров 4782 года назад
SCOR Cisco Training Series Section 29: In this module you will learn: Cloud Access Security Broker Adding Capability at the Cost of Complexity CASB Architecture Identifying the Different CASB Categories Cisco CloudLock Securing Users and Accounts Securing Cloud Data Securing Cloud Applications Thank you! Please consider Subscribing to channel.
Reporting and Threat Visibility in Cloud - Cisco StealthWatch
Просмотров 462 года назад
SCOR Cisco Training Series Section 29: In this module you will learn: Report and Threat Visibility in Cisco StealthWatch Cloud StealthWatch Cloud Operations AWS EC2 and VPC Thank you! Please consider Subscribing to channel.
Network Function Virtualization NFV and Virtual Network Functions VNF
Просмотров 1,2 тыс.2 года назад
SCOR Cisco Training Series Section 29: In this module you will learn: Cisco Network Function Virtualization NFV and Virtual Network Functions VNF Cisco NFV Examples Thank you! Please consider Subscribing to channel.
Application and Workload Security - Cisco Threat-Centric
Просмотров 382 года назад
SCOR Cisco Training Series Section 29: In this module you will learn: Application and Workload Security Container Orchestration SecDevOps Best Practices in detail. Thank you! Please consider Subscribing to channel.
Cisco Threat-Centric Approach to Network Security
Просмотров 572 года назад
SCOR Cisco Training Series Section 29 : In this module you will learn: Adaptive Network Security in detail. Cloud Physical Environment Security in detail. Thank you! Please consider Subscribing to channel.
Common Security Threats in Cloud - Cisco Cloud
Просмотров 502 года назад
SCOR Cisco Training Series Section 29 : In this module you will learn: Common Security Threats in Cloud Cloud Management and API Security Patch Management in the Cloud Thank you! Please consider Subscribing to channel.
Security Responsibilities in Cloud - Cisco Cloud p2
Просмотров 382 года назад
SCOR Cisco Training Series Section 29 : In this module you will learn: Security Responsibilities in Cloud Cloud Deployment Model - Public Cloud - Hybrid Cloud Public Cloud Deployment Model Hybrid Cloud Deployment Model Thank you! Please consider Subscribing to channel.
Evolution of Cloud Computing - CISO SCOR
Просмотров 232 года назад
SCOR Cisco Training Series Section 29 : In this module you will learn: Overview of Cloud computing and its benefits Could Service Models Infrastructure as a Service Model Platform as Service Model Software as a service model Thank you! Please consider Subscribing to channel.
Stealthwatch host groups - Cisco Stealthwatch p5
Просмотров 2442 года назад
SCOR Cisco Training Series Section 28 : In this module you will learn: Host Group Basics JavaUI / WebUi Editing Host Groups in Java Ui and WebUi Thank you! Please consider Subscribing to channel.
Cisco Encrypted Traffic Analytics - Cisco Steathwatch p4
Просмотров 702 года назад
SCOR Cisco Training Series Section 28 : In this module you will learn: Cisco Encrypted Traffic Analytics CTA (Cognitive Analytics) Integration Cisco ETA Use cases Thank you! Please consider Subscribing to channel.
Stealthwatch Enterprise and ISE Integrations - P3
Просмотров 4782 года назад
Stealthwatch Enterprise and ISE Integrations - P3
Flow Stitching and De-duplication - Cisco Stealthwatch
Просмотров 2922 года назад
Flow Stitching and De-duplication - Cisco Stealthwatch
Cisco Stealthwatch Offerings Overview
Просмотров 1642 года назад
Cisco Stealthwatch Offerings Overview
Configuring NetFlow on Cisco Router and NGFW - Practical
Просмотров 1392 года назад
Configuring NetFlow on Cisco Router and NGFW - Practical
Network Traffic Monitoring Using NetFlow - Cisco
Просмотров 1,7 тыс.2 года назад
Network Traffic Monitoring Using NetFlow - Cisco
Device and Network Events Logging and Export on Cisco Appliances - Practical
Просмотров 552 года назад
Device and Network Events Logging and Export on Cisco Appliances - Practical
Configuring NTP on CISCO ASA, FMC & NGFW - Practical
Просмотров 2,2 тыс.2 года назад
Configuring NTP on CISCO ASA, FMC & NGFW - Practical
AAA for Management Access on Cisco FMC - Practical
Просмотров 3952 года назад
AAA for Management Access on Cisco FMC - Practical
AAA for Management Access on CISCO Switch - Practical
Просмотров 492 года назад
AAA for Management Access on CISCO Switch - Practical
Config CPP on cisco ios router - Practical
Просмотров 112 года назад
Config CPP on cisco ios router - Practical
SSH Using Local Authentication cisco ios router - Practical
Просмотров 372 года назад
SSH Using Local Authentication cisco ios router - Practical
Simple Network Management Protocol Version 3 - SNMPv3 Practical
Просмотров 342 года назад
Simple Network Management Protocol Version 3 - SNMPv3 Practical
Many thanks for sharing
𝙰𝚗𝚍 𝚜𝚞𝚛𝚙𝚛𝚒𝚜𝚒𝚗𝚐𝚕𝚢, 𝚝𝚑𝚒𝚜 𝚌𝚑𝚊𝚗𝚗𝚎𝚕 𝚜𝚎𝚎𝚖𝚜 𝚒𝚝'𝚜 𝚍𝚎𝚍𝚒𝚌𝚊𝚝𝚎𝚍 𝚝𝚘 𝙸𝚃 𝚜𝚎𝚌𝚞𝚛𝚒𝚝𝚢, 𝚗𝚎𝚝𝚠𝚘𝚛𝚔𝚒𝚗𝚐 𝚝𝚞𝚝𝚘𝚛𝚒𝚊𝚕𝚜.
𝙸'𝚖 𝚟𝚎𝚛𝚢 𝚜𝚞𝚛𝚙𝚛𝚒𝚜𝚎 𝚝𝚘 𝚜𝚎𝚎 𝚝𝚑𝚊𝚝 𝚝𝚑𝚒𝚜 𝚐𝚞𝚒𝚝𝚊𝚛 𝚌𝚑𝚘𝚛𝚍 𝚒𝚜 𝚟𝚎𝚛𝚢 𝚏𝚊𝚖𝚘𝚞𝚜 𝚊𝚗𝚍 𝚟𝚒𝚛𝚊𝚕 𝚘𝚗 𝙸𝚗𝚜𝚝𝚊𝚐𝚛𝚊𝚖 𝚊𝚜 𝚖𝚊𝚗𝚢 𝚙𝚎𝚘𝚙𝚕𝚎 𝚊𝚛𝚎 𝚞𝚜𝚒𝚗𝚐 𝚒𝚝 𝚝𝚘 𝚖𝚊𝚔𝚎 𝚝𝚑𝚎𝚒𝚛 𝚛𝚎𝚎𝚕𝚜 𝚋𝚞𝚝 𝚗𝚘 𝚌𝚘𝚖𝚖𝚎𝚗𝚝𝚜 𝚊𝚛𝚎 𝚝𝚑𝚎𝚛𝚎. 𝙽𝚘𝚝 𝚖𝚞𝚌𝚑 𝚕𝚒𝚔𝚎𝚜, 𝚏𝚘𝚕𝚕𝚘𝚠𝚒𝚗𝚐 𝚊𝚗𝚍 𝚜𝚞𝚋𝚜𝚌𝚛𝚒𝚋𝚎𝚛𝚜 𝚊𝚛𝚎 𝚝𝚑𝚎𝚛𝚎. 𝙱𝚢 𝚝𝚑𝚎 𝚠𝚊𝚢, 𝙸 𝚠𝚊𝚜 𝚒𝚗 𝚜𝚎𝚊𝚛𝚌𝚑 𝚏𝚘𝚛 𝚝𝚑𝚒𝚜 𝚜𝚝𝚞𝚏𝚏 𝚊𝚗𝚍 𝚝𝚑𝚊𝚝 𝚑𝚊𝚜 𝚋𝚎𝚎𝚗 𝚏𝚞𝚕𝚏𝚒𝚕𝚕𝚎𝚍. 𝙻𝚞𝚟 𝚞 𝚐𝚞𝚢𝚜 ❤❤❤
ya really it's very helpful for all security students
Thanks, if you liked share with other students too :)
very educational, good job, many thanks !
Glad it was helpful!
I am having this issue with 802.1x on my machine. I'm trying to debug. Based on your instructions, if I'm receiving an Identity request from the switch, does that mean my computer already tried reaching out by eap and got a response? I'm trying to figure out if the initial step already occurred. I'm currently getting a endless loop of the switch sending back identity requests.
Great
Please make a comprehensive on video on ip access-group low impact and monitormode.
bruh where is the configuration
this man worked on my pc he has connected to my local network , he thought I didn't know but I figured it out he is in control of my MacBook, I don't really understand all this but this is what I have on my network I also have 3 utun,. I figured out he made a tunnel like using a vpn to bypass my firewall how in the world am I ever going to get him out of my network..
What is the Layer 3 security set to on the WLAN? None?
we really appreciate your work for uploading these videos. Thank you do much.
Hello, excellent video! "The FMC always shows the TIME in UTC format"? I am from Argentina and here it is 3 hours less. Does the same thing happen in the FTD or can I point to the same NTP Server and the time will be correct?
Excellent!
Glad you liked it!
Thanks for the video
Thanks for the video
Thank U, perfect explanation :)
you should do ine to use CWA but using a switch.
very Good, keep it up, thank you
Can we use cisco wsa as a proxy server & L4TM both at a same time?
what is the configuration for the switch ?
What is the cause if the eap-request packet is not sent from the device?
After weeks of searching and trying to read articles on how to configure my NAT on my ASA, this video has helped me tons. I understand it more now after watching this than I did after reading all kinds of documents on Cisco's website. Thank you for these videos.
great video, straight to the point...
glad you liked it
Were Bounty given for this?
Hey, thanks for this video. It’s tough to find quality content on RUclips on such specific topics. You can tell that the dude narrating knows what he’s talking about.
Why is the video still using old ISE interface? New one is looking totally different and was released before video was published.
Have you ever had issues with ewc when connected in hotspot environment
The lack of narration makes the mouse clicks especially loud
that's the point so we know he is moving on
why do we need inline mode when routed and transparent modes can block traffic?
I like your videos.
happy to hear that :)
hi
THANKS!!!
You're welcome!
your explaination is quite confusing
Perhaps I can explain in detail. Which part you had trouble understanding
Can we use tacacs+ in ISE for 802.1x authentication ?
no
SCOR….yay 😀
Very well and Thought out video Thanks!
Glad it helped!
will the same work with ipv6?
Very good and informative series you made here . I could really use you to take a closer look at my NGFW1120 :-) I am just a CCNA from years ago and I can tell now, that I haven´t released the potential of the our new FW.
Glad it helped you. :)
Scansafe/CWS doesn't exist anymore. It has been replaced by Umbrella SIG
what is the ip address of cisco umbrellla dns server
if you want to write comments to what you are doing, just use '#' before writing the comment and the bash will give no error back like this: #this is a comment to what I am doing and you're done
Oh yeah same as in python... Thanks, appriciate your feedback it'll help save time...
hmm nice
How to hack wifi
Stay tuned and subscribe i will be creating videos on that too