mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 05:34:12 +00:00
cde20ea2ad
Cloud Security Alliance Top Threats Deep Dive: A case study analysis for ‘The Treacherous 12: Top Threats to Cloud Computing’ and a relative security industry breach analysis |
||
---|---|---|
.. | ||
BRKSEC-3032.pdf | ||
Dockerfile_example | ||
FTD-clustering.md | ||
GETVPN.md | ||
IPSEC-VPNs.md | ||
learning_python_devnet.md | ||
README.md | ||
threat-response-api-example.py | ||
top-threats-to-cloud-computing-deep-dive.pdf | ||
zbfw.md |
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
This section is to document supplemental material for the Cisco Press CCNP and CCIE Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) official Cert Guide and Complete Video Course.
The SCOR 350-701 exam is the pre-requisite for the following Certifications:
- CCNP Security
- CCIE Security
- Cisco Certified Specialist - Security Core