350-701: Implementing and Operating Cisco Security Core Technologies

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Cisco Certifications - CCNP SCOR
Lectures | Duration |
---|---|
1. Cisco Certification Updates - FEB 2020 | 11m |
2. Cisco Re-Certifications | 1m |
3. CCNP Certifications | 1m |
4. CCIE Certifications | 2m |
5. Cisco Certification Migration Options | 6m |
6. CCNP Required Exams | 3m |
1. Cisco Certification Updates - FEB 2020
11m
2. Cisco Re-Certifications
1m
3. CCNP Certifications
1m
4. CCIE Certifications
2m
5. Cisco Certification Migration Options
6m
6. CCNP Required Exams
3m
Security Core - 350-701
Lectures | Duration |
---|---|
1. CCNP Security Certifications | 7m |
2. CCNP SCOR - 350-701 | 1m |
3. SCOR 350-701 Contents | 7m |
1. CCNP Security Certifications
7m
2. CCNP SCOR - 350-701
1m
3. SCOR 350-701 Contents
7m
Network Security Concepts
Lectures | Duration |
---|---|
1. Network Security Terminology | 6m |
2. Goals of Network Security | 10m |
3. Threat Types - Mitigation | 9m |
4. Assets - Classification of Assets | 6m |
5. Classify Counter Measures | 4m |
6. Classify Vulnerabilities | 2m |
7. Network Security - Design Principles | 10m |
1. Network Security Terminology
6m
2. Goals of Network Security
10m
3. Threat Types - Mitigation
9m
4. Assets - Classification of Assets
6m
5. Classify Counter Measures
4m
6. Classify Vulnerabilities
2m
7. Network Security - Design Principles
10m
Common Security Attacks - Mitigation
Lectures | Duration |
---|---|
1. Motivations behind Network Attacks | 3m |
2. Social Engineering Attacks | 4m |
3. Phishing Attacks | 4m |
5. Denial of Service Attacks - DoS | 5m |
6. Distributed Denial of Service Attakcs - DDoS | 4m |
7. Spoofing Attacks | 4m |
8. Spoofing Attacks - Mitigation | 4m |
9. Man in the Middle Attacks -MiTM | 2m |
10. Password Attacks | 5m |
11. Password Attacks - Mitigation | 4m |
12. Reflector Attacks | 2m |
13. Amplification Attacks | 2m |
14. Reconnaissance Attacks | 5m |
15. Reconnaissance Attacks - Mitigation | 2m |
1. Motivations behind Network Attacks
3m
2. Social Engineering Attacks
4m
3. Phishing Attacks
4m
5. Denial of Service Attacks - DoS
5m
6. Distributed Denial of Service Attakcs - DDoS
4m
7. Spoofing Attacks
4m
8. Spoofing Attacks - Mitigation
4m
9. Man in the Middle Attacks -MiTM
2m
10. Password Attacks
5m
11. Password Attacks - Mitigation
4m
12. Reflector Attacks
2m
13. Amplification Attacks
2m
14. Reconnaissance Attacks
5m
15. Reconnaissance Attacks - Mitigation
2m
Malicious Codes - Hacking
Lectures | Duration |
---|---|
1. Malicious Codes - VIRUS | 2m |
2. Malicious Codes - WORMS | 1m |
3. Malicious Codes - TROJAN HORSES | 1m |
4. Hacking | 1m |
5. Hackers - Script Kiddies | 1m |
6. Malware Service - DARKNET | 1m |
1. Malicious Codes - VIRUS
2m
2. Malicious Codes - WORMS
1m
3. Malicious Codes - TROJAN HORSES
1m
4. Hacking
1m
5. Hackers - Script Kiddies
1m
6. Malware Service - DARKNET
1m
Threat Defense Technologies
Lectures | Duration |
---|---|
1. AAA - Network Security | 11m |
2. Cisco Telemetry Services | 4m |
3. Firewall | 8m |
4. Intrusion Prevention System - IPS | 4m |
5. Virtual Private Networks | 4m |
6. Next Generation Firewalls | 6m |
1. AAA - Network Security
11m
2. Cisco Telemetry Services
4m
3. Firewall
8m
4. Intrusion Prevention System - IPS
4m
5. Virtual Private Networks
4m
6. Next Generation Firewalls
6m
Virtual Labs - GNS3 Setup
Lectures | Duration |
---|---|
1. Cisco Lab Options | 8m |
2. About GNS3 | 4m |
3. Installing GNS3 - Windows | 7m |
4. GNS3 - IOS Images | 6m |
5. Default Topology - GNS3 - IOS initial Configs | 5m |
6. IOS Default Topology | 9m |
7. GNS3 Topology-HOST Computer | 6m |
8. GNS3 - VMware Setup | 9m |
9. GNS3 - IOSv L2-L3 | 6m |
10. GNS3 - ASAv Setup | 4m |
11. GNS3 - IOU-L2-L3 | 3m |
1. Cisco Lab Options
8m
2. About GNS3
4m
3. Installing GNS3 - Windows
7m
4. GNS3 - IOS Images
6m
5. Default Topology - GNS3 - IOS initial Configs
5m
6. IOS Default Topology
9m
7. GNS3 Topology-HOST Computer
6m
8. GNS3 - VMware Setup
9m
9. GNS3 - IOSv L2-L3
6m
10. GNS3 - ASAv Setup
4m
11. GNS3 - IOU-L2-L3
3m
Network Infrastructure Protection
Lectures | Duration |
---|---|
1. Network Infrastructure Protection | 5m |
2. Identify Network Device Planes | 2m |
3. Data Plane | 6m |
4. Control Plane | 3m |
5. Management Plane | 3m |
1. Network Infrastructure Protection
5m
2. Identify Network Device Planes
2m
3. Data Plane
6m
4. Control Plane
3m
5. Management Plane
3m
Remote Management- TELNET - SSH
Lectures | Duration |
---|---|
1. Inband Vs OutBand Management | 7m |
2. Remote Access - TELNET | 6m |
3. Remote Access - SSH | 9m |
1. Inband Vs OutBand Management
7m
2. Remote Access - TELNET
6m
3. Remote Access - SSH
9m
Cisco Telemetry Services
Lectures | Duration |
---|---|
1. Cisco Telemetry Services | 4m |
2. Device- Network Events Logging | 10m |
3. Syslog - Terminal Logging | 7m |
4. Network Time Protocol | 7m |
5. NTP Stratum Value | 4m |
6. NTP Configuration - LAB | 9m |
1. Cisco Telemetry Services
4m
2. Device- Network Events Logging
10m
3. Syslog - Terminal Logging
7m
4. Network Time Protocol
7m
5. NTP Stratum Value
4m
6. NTP Configuration - LAB
9m
Control Plane Security
Lectures | Duration |
---|---|
1. Control Plane Security - Possible Threats | 9m |
2. Routing Protocol Authentication | 12m |
3. Control Plane Policing - CoPP | 7m |
4. Class-Map - Policy Map - Hierarchy | 5m |
5. CoPP - Configuration Examples | 12m |
1. Control Plane Security - Possible Threats
9m
2. Routing Protocol Authentication
12m
3. Control Plane Policing - CoPP
7m
4. Class-Map - Policy Map - Hierarchy
5m
5. CoPP - Configuration Examples
12m
L2-Security Basic
Lectures | Duration |
---|---|
1. Switch Security - Overview | 2m |
2. Disable Unused Ports | 1m |
3. Dynamic Trunking Protocol - DTP | 8m |
4. DTP Vulnerabilities - Mitigation | 2m |
5. VLAN Hopping Attacks - Mitigation | 5m |
6. Cisco Discovery Protocol - CDP | 18m |
7. Link Layer Discovery Protocol - LLDP | 3m |
8. CDP- LLDP Vulnerabilities - Mitigation | 2m |
1. Switch Security - Overview
2m
2. Disable Unused Ports
1m
3. Dynamic Trunking Protocol - DTP
8m
4. DTP Vulnerabilities - Mitigation
2m
5. VLAN Hopping Attacks - Mitigation
5m
6. Cisco Discovery Protocol - CDP
18m
7. Link Layer Discovery Protocol - LLDP
3m
8. CDP- LLDP Vulnerabilities - Mitigation
2m
L2-Security Advanced
Lectures | Duration |
---|---|
1. MAC Flooding Attack - Port Security | 12m |
2. MAC Spoofing Attack - Port Security | 7m |
3. Port Security - Configuration | 11m |
4. Spanning Tree Port Fast | 7m |
5. Native VLAN | 8m |
6. DHCP Spoofing Attack - DHCP Spoofing | 8m |
7. DHCP Snooping - Configuration | 16m |
8. DHCP Starvation Attack - Mitigation | 2m |
9. ARP Spoofing Attack - DAI | 12m |
10. Dynamic ARP Inspection - Configuration | 12m |
11. Protected Ports- Private VLAN Edge | 3m |
12. Private VLAN | 9m |
13. Private VLAN - Configuration | 5m |
14. Private VLAN - LAB | 20m |
1. MAC Flooding Attack - Port Security
12m
2. MAC Spoofing Attack - Port Security
7m
3. Port Security - Configuration
11m
4. Spanning Tree Port Fast
7m
5. Native VLAN
8m
6. DHCP Spoofing Attack - DHCP Spoofing
8m
7. DHCP Snooping - Configuration
16m
8. DHCP Starvation Attack - Mitigation
2m
9. ARP Spoofing Attack - DAI
12m
10. Dynamic ARP Inspection - Configuration
12m
11. Protected Ports- Private VLAN Edge
3m
12. Private VLAN
9m
13. Private VLAN - Configuration
5m
14. Private VLAN - LAB
20m
Firewalls
Lectures | Duration |
---|---|
1. What is Firewall | 8m |
2. Statefull Packet Filtering | 8m |
3. Stateless Packet Filtering | 4m |
4. Application Level Gateways - Proxy Servers | 5m |
5. Next Generation Firewalls | 6m |
6. FIrewall Vendors in Market | 6m |
1. What is Firewall
8m
2. Statefull Packet Filtering
8m
3. Stateless Packet Filtering
4m
4. Application Level Gateways - Proxy Servers
5m
5. Next Generation Firewalls
6m
6. FIrewall Vendors in Market
6m
Cisco ASA Firewall
Lectures | Duration |
---|---|
1. Cisco Statefull Firewalls - IOS - ASA | 3m |
2. ASA Supported Features _ PART1 | 9m |
3. ASA Supported Features _ PART2 | 11m |
4. ASS Compare Models | 7m |
1. Cisco Statefull Firewalls - IOS - ASA
3m
2. ASA Supported Features _ PART1
9m
3. ASA Supported Features _ PART2
11m
4. ASS Compare Models
7m
Cisco ASA Configuration
Lectures | Duration |
---|---|
1. Manage Cisco CLI - ASA - GUI | 3m |
2. Basic CLI Modes - Commands | 4m |
3. ASA Security Levels | 10m |
4. ASA Interface Configurations | 5m |
5. ASA Security Policies - Default | 11m |
6. ASA Routing | 5m |
1. Manage Cisco CLI - ASA - GUI
3m
2. Basic CLI Modes - Commands
4m
3. ASA Security Levels
10m
4. ASA Interface Configurations
5m
5. ASA Security Policies - Default
11m
6. ASA Routing
5m
ASA ACLs - Object Groups
Lectures | Duration |
---|---|
1. ASA ACls - Overview | 9m |
2. ASA ACLS - Basic Example | 7m |
3. Traffic Between Same Security Levels | 3m |
4. ACL Object Groups | 10m |
5. ACL Object Groups - LAB | 12m |
1. ASA ACls - Overview
9m
2. ASA ACLS - Basic Example
7m
3. Traffic Between Same Security Levels
3m
4. ACL Object Groups
10m
5. ACL Object Groups - LAB
12m
ASA _ Network Address Translation (NAT)
Lectures | Duration |
---|---|
1. PRivate IP - Public IP | 5m |
2. What is NAT ? | 3m |
3. NAT Types | 6m |
4. Dynamic NAT - on ASA | 10m |
5. Dynamic PAT- ASA | 5m |
6. Dynamic PAT - with Exit interface | 5m |
7. Dynamic NAT-PAT Combination | 2m |
8. Static NAT - ASA | 12m |
9. Static PAT- ASA | 11m |
1. PRivate IP - Public IP
5m
2. What is NAT ?
3m
3. NAT Types
6m
4. Dynamic NAT - on ASA
10m
5. Dynamic PAT- ASA
5m
6. Dynamic PAT - with Exit interface
5m
7. Dynamic NAT-PAT Combination
2m
8. Static NAT - ASA
12m
9. Static PAT- ASA
11m
IOS - Zone Based Firewall
Lectures | Duration |
---|---|
1. IOS - Zone Based Firewall | 3m |
2. ZBF - Configuration Overview | 4m |
3. ZBF - Security Zones | 3m |
4. ZBF - Default Flow | 3m |
5. Class-Map - Policy Map - Hierarchy | 5m |
6. ZBF - Classify Traffic using Class-Maps | 6m |
7. ZBF- Class-map Configuration | 5m |
8. ZBF - POlicy Map - Zone Pairs | 11m |
1. IOS - Zone Based Firewall
3m
2. ZBF - Configuration Overview
4m
3. ZBF - Security Zones
3m
4. ZBF - Default Flow
3m
5. Class-Map - Policy Map - Hierarchy
5m
6. ZBF - Classify Traffic using Class-Maps
6m
7. ZBF- Class-map Configuration
5m
8. ZBF - POlicy Map - Zone Pairs
11m
Cryptography
Lectures | Duration |
---|---|
1. What is Cryptography | 3m |
2. Goals of Cryptography | 3m |
3. Hashing-How it Works | 3m |
4. Hashing with HMAC | 3m |
5. What is Encryption - Decryption | 1m |
6. Encryption Algorithms - Symmetric vs Assymetric | 5m |
7. Cryptanalysis - Attacks | 4m |
8. Asymmetric Encryption - Drawbacks | 3m |
9. Public Key Infrastructure - PKI | 4m |
1. What is Cryptography
3m
2. Goals of Cryptography
3m
3. Hashing-How it Works
3m
4. Hashing with HMAC
3m
5. What is Encryption - Decryption
1m
6. Encryption Algorithms - Symmetric vs Assymetric
5m
7. Cryptanalysis - Attacks
4m
8. Asymmetric Encryption - Drawbacks
3m
9. Public Key Infrastructure - PKI
4m
VPN foundations
Lectures | Duration |
---|---|
1. Virutal Private Network - Introduction | 5m |
2. VPN Types - Site to Site / Remote Access | 4m |
3. VPN Logical Topologies | 1m |
4. VPN Default Lab Setup - Routers | 5m |
1. Virutal Private Network - Introduction
5m
2. VPN Types - Site to Site / Remote Access
4m
3. VPN Logical Topologies
1m
4. VPN Default Lab Setup - Routers
5m
IPSec - IP Protocol Security
Lectures | Duration |
---|---|
1. What is IPSec ? | 3m |
2. IPsec Security Services | 7m |
3. IPSec Modes - Tunnel vs Transport | 5m |
1. What is IPSec ?
3m
2. IPsec Security Services
7m
3. IPSec Modes - Tunnel vs Transport
5m
Site to Site IPSEC VPN
Lectures | Duration |
---|---|
1. How IPsec VPN Works | 5m |
2. Step-1 - Interesting Traffic | 3m |
3. Step-2 IKE Phase-1 | 8m |
4. Step-3 - IKE Phase 2 | 9m |
5. IKE Phase 2 - Configuration/ Verification | 7m |
1. How IPsec VPN Works
5m
2. Step-1 - Interesting Traffic
3m
3. Step-2 IKE Phase-1
8m
4. Step-3 - IKE Phase 2
9m
5. IKE Phase 2 - Configuration/ Verification
7m
Remote Access VPN
Lectures | Duration |
---|---|
1. Remote Access VPN | 3m |
2. What is SSL-TLS | 3m |
3. How SSL-TLS Works | 8m |
4. What is SSL VPN | 4m |
5. SSL VPN - Modes | 6m |
1. Remote Access VPN
3m
2. What is SSL-TLS
3m
3. How SSL-TLS Works
8m
4. What is SSL VPN
4m
5. SSL VPN - Modes
6m
Authentication, Authorization, Accounting - AAA
Lectures | Duration |
---|---|
1. AAA - Network Security | 11m |
2. AAA - Components | 4m |
3. AAA Protocols - TACACS - RADIUS | 8m |
4. AAA- Cisco Authentication Servers | 4m |
1. AAA - Network Security
11m
2. AAA - Components
4m
3. AAA Protocols - TACACS - RADIUS
8m
4. AAA- Cisco Authentication Servers
4m
AAA Authentication
Lectures | Duration |
---|---|
1. AAA Authentication - Device Access | 3m |
2. Authentication Local database | 10m |
3. AAA External Servers | 3m |
4. Authentication - External server (TACACS) | 12m |
1. AAA Authentication - Device Access
3m
2. Authentication Local database
10m
3. AAA External Servers
3m
4. Authentication - External server (TACACS)
12m
AAA Authorization
Lectures | Duration |
---|---|
1. Authorization - Device Access | 3m |
2. IOS Privilege Levels | 9m |
3. Local Authorization using Privilege Levels | 14m |
4. IOS Privilege Levels _ Limitations | 5m |
5. Role based CLI Access - RBAC | 6m |
6. RBAC Views - Types | 4m |
7. RBAC Views - LAB1 | 10m |
8. Modify RBAC Views - LAB 2 | 4m |
9. Modify RBAC Views - LAB 3 | 6m |
10. RBAC - Super Views | 5m |
1. Authorization - Device Access
3m
2. IOS Privilege Levels
9m
3. Local Authorization using Privilege Levels
14m
4. IOS Privilege Levels _ Limitations
5m
5. Role based CLI Access - RBAC
6m
6. RBAC Views - Types
4m
7. RBAC Views - LAB1
10m
8. Modify RBAC Views - LAB 2
4m
9. Modify RBAC Views - LAB 3
6m
10. RBAC - Super Views
5m
WEb Traffic - Attacks- Solutions
Lectures | Duration |
---|---|
1. Web Access - Possible Threats | 4m |
2. Web Based Attacks- | 5m |
3. Web Attack Examples | 10m |
4. Web Security Solutions | 5m |
1. Web Access - Possible Threats
4m
2. Web Based Attacks-
5m
3. Web Attack Examples
10m
4. Web Security Solutions
5m
CIsco Web Security Appliance - WSA
Lectures | Duration |
---|---|
1. Cisco Web Security - WSA-CWS | 5m |
2. What is WSA ? | 9m |
3. WSA- HOw it Works | 5m |
4. WSA Deployment Modes | 6m |
5. WSA models - Physical -Virtual Appliance | 5m |
6. WSA Licensing Options | 7m |
1. Cisco Web Security - WSA-CWS
5m
2. What is WSA ?
9m
3. WSA- HOw it Works
5m
4. WSA Deployment Modes
6m
5. WSA models - Physical -Virtual Appliance
5m
6. WSA Licensing Options
7m
Email Security _ ESA
Lectures | Duration |
---|---|
1. Email Based Threats | 2m |
2. Cisco Email Security Appliance - ESA | 3m |
1. Email Based Threats
2m
2. Cisco Email Security Appliance - ESA
3m
Intrusion Prevention System - IPS
Lectures | Duration |
---|---|
1. Intrusion Prevention System - IPS | 3m |
2. IDS vs IPS | 2m |
3. Host Based IPS vs Network Based IPS | 6m |
4. IPS Deployment Modes - INline vs Promiscious | 3m |
5. Cisco IPS Solutions | 5m |
6. IPS Threat Detection Methods | 7m |
7. IPS Signature Alarm Types | 3m |
8. IPS Signature Actions | 3m |
9. IPS Evasion Methods - CounterMeasures | 6m |
1. Intrusion Prevention System - IPS
3m
2. IDS vs IPS
2m
3. Host Based IPS vs Network Based IPS
6m
4. IPS Deployment Modes - INline vs Promiscious
3m
5. Cisco IPS Solutions
5m
6. IPS Threat Detection Methods
7m
7. IPS Signature Alarm Types
3m
8. IPS Signature Actions
3m
9. IPS Evasion Methods - CounterMeasures
6m
Network Management
Lectures | Duration |
---|---|
1. What is Network Management | 8m |
2. Past-Present Methods of Network Mangement- PART 1 | 14m |
3. Past-Present Methods of Network Mangement- PART 2 | 7m |
4. SNMP- Simple Network Mangement Protocol | 18m |
1. What is Network Management
8m
2. Past-Present Methods of Network Mangement- PART 1
14m
3. Past-Present Methods of Network Mangement- PART 2
7m
4. SNMP- Simple Network Mangement Protocol
18m
Network Automation
Lectures | Duration |
---|---|
1. Challenges - Traditional Management | 11m |
2. Network Automation - Goals | 16m |
3. Types of Network Automation | 6m |
4. What can be Automated - PART 1 | 12m |
5. What can be Automated - PART 2 | 9m |
6. Impact of Network Automation | 8m |
1. Challenges - Traditional Management
11m
2. Network Automation - Goals
16m
3. Types of Network Automation
6m
4. What can be Automated - PART 1
12m
5. What can be Automated - PART 2
9m
6. Impact of Network Automation
8m
SDN & SDN Controllers
Lectures | Duration |
---|---|
1. Automation Origination Points | 8m |
2. SDN - Software Defined Networking | 15m |
3. SDN Controllers | 9m |
4. Networks Managed by SDN Controllers | 13m |
1. Automation Origination Points
8m
2. SDN - Software Defined Networking
15m
3. SDN Controllers
9m
4. Networks Managed by SDN Controllers
13m
SDN-Control-MGMT-DATA Plane
Lectures | Duration |
---|---|
1. Management Plane | 3m |
2. SDN-Management Plane | 7m |
3. SDN-Control Plane - Data Plane | 6m |
1. Management Plane
3m
2. SDN-Management Plane
7m
3. SDN-Control Plane - Data Plane
6m
SDN Models - Architecture
Lectures | Duration |
---|---|
1. SDN - Imperative Model | 5m |
2. SDN - Declarative Model | 7m |
3. SDN - Network Design Requirments | 9m |
4. UNderlaY Networks | 7m |
5. Overlay Networks | 7m |
6. SDN Fabric | 6m |
1. SDN - Imperative Model
5m
2. SDN - Declarative Model
7m
3. SDN - Network Design Requirments
9m
4. UNderlaY Networks
7m
5. Overlay Networks
7m
6. SDN Fabric
6m
Application Programming Interface - API
Lectures | Duration |
---|---|
1. Application Programming Interface - API | 11m |
2. API Types | 4m |
3. API - With SDN Networks | 9m |
4. NorthBound API | 9m |
5. SouthBound API | 8m |
1. Application Programming Interface - API
11m
2. API Types
4m
3. API - With SDN Networks
9m
4. NorthBound API
9m
5. SouthBound API
8m
Cisco DEVNET - SANDBOXs
Lectures | Duration |
---|---|
1. Cisco DevNet | 5m |
2. DevNet Certifications | 5m |
3. DevNet Sandbox | 6m |
4. DevNet Sandbox LABS | 8m |
5. Sandbox LAB Access - Reservations | 3m |
1. Cisco DevNet
5m
2. DevNet Certifications
5m
3. DevNet Sandbox
6m
4. DevNet Sandbox LABS
8m
5. Sandbox LAB Access - Reservations
3m
Cisco DNA Center
Lectures | Duration |
---|---|
1. Cisco DNA Center | 16m |
2. DNA Center Appliance | 4m |
3. DNA Center- What can do - PART 1 | 11m |
4. DNA Center- What can do - PART 2 | 13m |
1. Cisco DNA Center
16m
2. DNA Center Appliance
4m
3. DNA Center- What can do - PART 1
11m
4. DNA Center- What can do - PART 2
13m
Web Service API - REST API
Lectures | Duration |
---|---|
1. Web Service API | 8m |
2. Web Service API - Commonly Used | 8m |
3. REST API | 8m |
1. Web Service API
8m
2. Web Service API - Commonly Used
8m
3. REST API
8m
Network Automation Tools
Lectures | Duration |
---|---|
1. Config Management Tools | 6m |
2. Config Management Tools - Capabilities | 9m |
3. Master-Agent | 6m |
4. Agent Based vs Agentless | 7m |
5. Push-Pull Model | 10m |
6. Configuration Files | 5m |
1. Config Management Tools
6m
2. Config Management Tools - Capabilities
9m
3. Master-Agent
6m
4. Agent Based vs Agentless
7m
5. Push-Pull Model
10m
6. Configuration Files
5m
PUPPET - Config MGMT Tool
Lectures | Duration |
---|---|
1. PUPPET - Config MGMT Tool | 3m |
2. PUPPET-Master Agent Database | 3m |
3. PUPPET - Manifest | 5m |
4. PUPPET-Module-Forge | 6m |
5. PUPPET-Agent- Agentless | 3m |
6. PUPPET-PULL Model Steps | 4m |
1. PUPPET - Config MGMT Tool
3m
2. PUPPET-Master Agent Database
3m
3. PUPPET - Manifest
5m
4. PUPPET-Module-Forge
6m
5. PUPPET-Agent- Agentless
3m
6. PUPPET-PULL Model Steps
4m
CHEF- Config MGMT Tool
Lectures | Duration |
---|---|
1. CHEF- Config MGMT Tool | 6m |
2. CHEF- Terminology | 7m |
1. CHEF- Config MGMT Tool
6m
2. CHEF- Terminology
7m
ANSIBLE- COnfig MGMT Tool
Lectures | Duration |
---|---|
1. ANSIBLE- COnfig MGMT Tool | 8m |
2. ANSIBLE- Control Station | 3m |
3. ANSIBLE- PlayBook-Inventory | 5m |
4. ANSIBLE- Templates-Variables | 7m |
1. ANSIBLE- COnfig MGMT Tool
8m
2. ANSIBLE- Control Station
3m
3. ANSIBLE- PlayBook-Inventory
5m
4. ANSIBLE- Templates-Variables
7m
JSON Data Encoding
Lectures | Duration |
---|---|
1. API Data Formats | 8m |
2. JSON Overview | 8m |
3. JSON Data Types | 7m |
4. JSON Syntax Rules | 3m |
5. JSON Data Interpretation | 7m |
1. API Data Formats
8m
2. JSON Overview
8m
3. JSON Data Types
7m
4. JSON Syntax Rules
3m
5. JSON Data Interpretation
7m