| Parent directory/ | - | - |
| 49.Explaining the Benefits of Streaming Telemetry/ | - | 2025-Sep-06 17:31 |
| 25.EIGRP Neighbor Relationships and Authentication | - | 2025-Sep-06 17:30 |
| 31.Troubleshoot Network Problems using Logging/ | - | 2025-Sep-06 17:31 |
| 45.802.1X Fundamentals/ | - | 2025-Sep-06 17:31 |
| 27.Troubleshoot OSPF Authentication for IPv6/ | - | 2025-Sep-06 17:31 |
| 29.Management Options to Improve Security/ | - | 2025-Sep-06 17:31 |
| 47.Configure a Switch for 802.1X/ | - | 2025-Sep-06 17:31 |
| 51.The Components of Network Security Design/ | - | 2025-Sep-06 17:31 |
| 24.Additional Layer 2 Security/ | - | 2025-Sep-06 17:30 |
| 15.Interpret Basic Python Scripts used with Cis..> | - | 2025-Sep-06 17:30 |
| 50.Describing the Features of Various Cisco Sec..> | - | 2025-Sep-06 17:31 |
| 14.DNA Center Foundations/ | - | 2025-Sep-06 17:30 |
| 13.Explain APIs in the SDN Architecture/ | - | 2025-Sep-06 17:30 |
| 30.Troubleshoot SNMP/ | - | 2025-Sep-06 17:31 |
| 42.Explain Various Types of Endpoint Defenses/ | - | 2025-Sep-06 17:31 |
| 12.Security Intelligence/ | - | 2025-Sep-06 17:30 |
| 20.Private VLANS/ | - | 2025-Sep-06 17:30 |
| 48.Explain Exfiltration Techniques/ | - | 2025-Sep-18 16:38 |
| 7.Cisco DMVPN/ | - | 2025-Sep-06 17:32 |
| 18.Configure and Verify Cisco DHCP Snooping/ | - | 2025-Sep-06 17:30 |
| 28.Firepower Access Control Policies/ | - | 2025-Sep-18 16:38 |
| 3.Components of Cryptography/ | - | 2025-Sep-06 17:31 |
| 33.Securing Cloud Software-as-a-Service/ | - | 2025-Sep-06 17:31 |
| 26.Troubleshoot OSPF Authentication for IPv4/ | - | 2025-Sep-06 17:31 |
| 8.Cisco GET VPN/ | - | 2025-Sep-06 17:32 |
| 16.Troubleshoot NetFlow/ | - | 2025-Sep-06 17:30 |
| 4.IPsec Fundamentals/ | - | 2025-Sep-06 17:31 |
| 21.VRF-lite/ | - | 2025-Sep-06 17:30 |
| 43.Endpoint Security/ | - | 2025-Sep-06 17:31 |
| 32.Planning for and Securing Cloud Platform/ | - | 2025-Sep-06 17:31 |
| 36.Software Development Methodologies/ | - | 2025-Sep-06 17:31 |
| 34.Securing Cloud Platform-as-a-Service/ | - | 2025-Sep-06 17:31 |
| 5.Cisco Router Site-To-Site VPNs/ | - | 2025-Sep-18 16:38 |
| 9.Cisco FlexVPN/ | - | 2025-Sep-06 17:32 |
| 2.Compare Common Security Vulnerabilities/ | - | 2025-Sep-06 17:30 |
| 46.Configure ISE for 802.1X/ | - | 2025-Sep-06 17:31 |
| 22.Network Infrastructure Device Hardening/ | - | 2025-Sep-06 17:30 |
| 11.Debugging for IPsec Tunnels/ | - | 2025-Sep-06 17:30 |
| 39.Cisco Email Security/ | - | 2025-Sep-06 17:31 |
| 23.Configure Cisco TrustSec/ | - | 2025-Sep-06 17:30 |
| 41.Understand and Configure AMP for Endpoints/ | - | 2025-Sep-06 17:31 |
| 52.Explain a DevSecOps Pipeline/ | - | 2025-Sep-06 17:31 |
| 53.Summarize Capabilities of Cisco Security Pro..> | - | 2025-Sep-06 17:31 |
| 19.Configure and Verify Cisco Dynamic ARP Inspe..> | - | 2025-Sep-06 17:30 |
| 44.Describe Controls for End Users' Network Access | - | 2025-Sep-06 17:31 |
| 10.Cisco Remote Access VPNs/ | - | 2025-Sep-06 17:30 |
| 6.Cisco Point-To-Point GRE over IPsec VPNs/ | - | 2025-Sep-06 17:32 |
| 1.Explain Common Threats Against On-premises an..> | - | 2025-Sep-06 17:30 |
| 54.Manage Cisco Secure Endpoint/ | - | 2025-Sep-06 17:31 |
| 55.Explore Cisco Secure Network Analytics and NVM/ | - | 2025-Sep-06 17:32 |
| 35.Securing Cloud Infrastructure-as-a-Service/ | - | 2025-Sep-06 17:31 |
| 17.Configure and Verify Cisco Port Security/ | - | 2025-Sep-06 17:30 |
| 37.Capture and Redirection Methods/ | - | 2025-Sep-06 17:31 |
| 38.Cisco Web Security/ | - | 2025-Sep-06 17:31 |
| 40.Cisco Umbrella/ | - | 2025-Sep-06 17:31 |