Inhalt: In this course, instructor Lisa Bock helps you prepare for the Cisco CBROPS exam. Lisa covers the principles of a defense-in-depth strategy, to ensure the confidentiality, availability, and integrity of a system. Lisa outlines today's threats and threat actors, and explores the relationship between risk, threat, vulnerability, and exploit. She helps you understand the metrics that make up the Common Vulnerability Scoring System. She reviews access control models and stresses the importance of employing the principle of least privilege. Lisa covers the challenges of complex environments in monitoring traffic and describes how using SIEM, SOAR, and log management helps consolidate information. She summarizes security deployments, such as network and endpoint systems. Lisa compares anti-malware applications, outlines the benefits of using threat intelligence, and concludes by describing methods you can use to manage risks and prevent data loss. Umfang: 02:22:37
Inhalt: In this course, instructor Lisa Bock describes the various attacks that can occur on the network, along with ways malicious actors use methods such as tunneling and encryption to conceal their behavior. Learn how to recognize the importance of having application visibility and control to effectively monitor the network. Lisa shows you how to examine system data from tcpdump and NetFlow to help with analysis. Discover ways to limit data visibility from threat actors on the network, by using access control lists and network address translation. She then outlines how to assure trust on the network by using the Public Key Infrastructure (PKI). Finally, see how a trusted third party uses certificates to securely exchange session keys to all parties in a transaction. Along the way, Lisa provides practical challenges that let you put your new knowledge to the test. Umfang: 02:27:30
Inhalt: Cybersecurity specialists and related occupations are in high demand. In this course, instructor Lisa Bock helps you prepare for the host-based analysis portion of the Cisco CyberOps exam. Lisa begins by summarizing key components in a Windows OS. She then walks you through the architecture, file system, and registry, along with ways you can interact with netstat to monitor active processes. Lisa reviews basics on how to monitor the Linux OS, either while working in the shell or a GUI. She describes the importance of having a solid grasp of the network architecture and reinforces how to achieve defense in depth to monitor and protect all endpoints. Lisa then covers the elements of an IPS/IDS log entry, along with ways to examine your network security data. She summarizes methods to generate a malware analysis report. Finally, Lisa explains how to respond effectively to a cybersecurity incident while preserving the chain of custody after an attack. Umfang: 01:40:24
Inhalt: The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Umfang: 01:34:27.00
Inhalt: As a network professional, it's imperative to have a solid understanding of endpoint threats and how to defend against them. In this course, bolster your understanding of how to combat threats as you study for the Cisco Certified Network Associate (CCNA) Security exam. Join security ambassador Lisa Bock as she prepares you for the Content and Endpoint Security section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa begins by reviewing the current state of cybersecurity and the importance of standards and regulations such as HIPAA and GDPR to ensure privacy. She outlines the COBIT framework and explains how it helps organizations provide information assurance, security, and risk mitigation. She covers web and email security concepts that include web filtering, along with email encryption and spam filtering. To wrap up, she shares best practices, such as leveraging antimalware protection and personal firewalls to prevent data loss in an organization. Umfang: 01:11:52.00
Inhalt: Earning a Cisco Certified Network Associate (CCNA) Security certification demonstrates that you have the specialized knowledge needed to secure Cisco networks. Join Lisa Bock as she prepares you to tackle the Security Concepts portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. In this course Lisa covers essential security terms, and discusses common security threats such as active and passive attacks, social engineering, and malware. She reviews cryptographic techniques such as encryption and digital signatures, and describes various network topologies such as campus area networks, wide area networks, and data centers. Umfang: 01:35:03.00
Inhalt: Validate your technical skills and ability to keep a Cisco network secure by earning the Cisco Certified Network Associate (CCNA) Security certification. Join security ambassador Lisa Bock as she prepares you for the Intrusion Prevention Systems (IPS) section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa provides an overview of intrusion detection and intrusion prevention systems (IDS/IPS) and explains how they detect and mitigate common attacks. She covers detection and signature engines, triggering actions and responses, and deploying an IOS-based IPS. In addition, she goes over some practical applications of these systems, including honeypot-based intrusion detection and the EINSTEIN system from the Department of Homeland Security. Umfang: 01:11:34.00
Inhalt: Administering a network means controlling access to network resources: granting, limiting, preventing, and revoking permissions as necessary. This course covers the topic of secure access, including in-band and out-of-band management, secure device access, and protocols such as NTP, SCP, and SNMP, as they relate to the Secure Access domain of Cisco Certified Network Associate (CCNA) Security exam 210-260. Security ambassador Lisa Bock introduces the three a's of triple-A security: authentication, authorization, and accounting. She compares RADIUS and TACACS+ authentication, and BYOD or bring your own device architecture. Plus, learn about mobile device management and security as it applies to the Internet of Things. These lessons will help you configure and manage Cisco devices, prepare for the CCNA Security exam, and properly secure your organization's infrastructure. Umfang: 01:25:11.00
Inhalt: A malicious person that gains access to a switch or router can modify system integrity to steal information or disrupt communications. Cisco Certified Network Associates (CCNAs)-and other qualified network administrators-should know how to prevent attacks by securing networking devices. This course covers secure routing and switching, including mitigation procedures and VLAN switching, as covered by CCNA Security certification exam 210-260. Lisa Bock, a security ambassador, explains the difference between the control, data, and management planes in networking, and provides to an overview of Layer 3 attacks and techniques for securing Cisco routers. Next, she addresses Layer 2 attacks and techniques to secure Cisco switches. She includes mitigation procedures such as dynamic ARP inspection and BPDU guard, and wraps up with a discussion of VLAN security. Umfang: 01:21:10.00
Inhalt: Boost your technical skill set by earning a Cisco Certified Network Associate (CCNA) Security certification. By passing the CCNA Security exam, you demonstrate to potential employers that you have the specialized knowledge needed to secure Cisco networks. In this course, join Lisa Bock as she prepares you to tackle the VPN portion of the CCNA Security exam 210-260, Implementing Cisco Network Security. Lisa covers essential VPN concepts-including the different types of VPNs, topologies, and working with the Cisco Adaptive Security Appliance-which offers many functions to help secure networks. She also dives into the IPsec framework, VPN configuration, and how to prepare your site for an IPsec VPN. Umfang: 01:27:23.00
Inhalt: If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks. Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain. Umfang: 01:31:36.00
Inhalt: What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:21:35.00
Inhalt: You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts. Umfang: 01:20:33.00
Inhalt: After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Umfang: 01:54:44.00
Inhalt: Ethical hackers: Get an inside look into the tools the black hat hackers use to "sniff" network traffic, and discover how to countermeasure such attacks. Security ambassador Lisa Bock explains what a sniffer is, and how hackers use it to intercept network traffic. She reviews the seven-layer OSI model, active vs. passive attacks, and the different types of protocol attacks, including MAC and macof attacks, DNS caching and forgery, DHCP denial-of-service attacks, and ARP cache poisoning. Learn how ethical hackers have an arsenal of tools to emulate these attacks and techniques, from examining headers and URLs to capturing images. Lisa relies on Wireshark, a network protocol analyzer for Unix and Windows, but also introduces other sniffing tools, including TShark, tcpdump, and CloudShark. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:20:58.00
Inhalt: Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:56.00
Inhalt: System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking-password cracking, privilege escalation, spyware installation, and keylogging-and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Umfang: 01:25:19.00
Inhalt: In order to assess-and ultimately, decrease-an organization's risk, IT security professionals must first evaluate and reduce existing vulnerabilities. If you're working to strengthen network security at your organization, it's essential to have a solid grasp of the processes, methodologies, and tools needed to assess vulnerabilities. In this course, security expert Lisa Bock takes a deep dive into the topic of vulnerability scanning, covering what you need to know to find and address weaknesses that attackers might exploit. Lisa goes over the basics of managing organizational risk, discusses vulnerability analysis methodologies, and shows how to work with vulnerability assessment tools, including Nikto and OpenVAS. Plus, she shares tools and strategies for defending the LAN. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10. Umfang: 01:09:34.00
Inhalt: Computing and internet security are everyone''s business, but it''s especially critical for information technology specialists. Learning the core concepts of operating-system and network-level security helps avoid ongoing threats and eliminate system vulnerabilities. These topics are also key components of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). This beginner-level, Windows-based course covers core security concepts and introduces risks such as social engineering, malware, and spyware as it prepares you for exam 98-367. IT Security Foundations series creator Lisa Bock also goes over some basic wireless security best practices, tips for beefing up browser security, and techniques for implementing encryption. Umfang: 01:35:47.00
Inhalt: Network security is the keystone of IT security, and an important component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this installment of Foundations of IT Security, series creator Lisa Bock will cover one of the main topics of the exam: securing an organization's network to keep interconnected systems and data safe. The course introduces security devices such as firewalls and packet inspectors, network isolation, and common security protocols. She also provides an overview of how to protect clients with antivirus software, encrypt offline files, and implement software restriction policies. Finally, she looks at the often-overlooked topics of mobile device and physical security, which includes securing a building's perimeter and the hardware within. Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information. Umfang: 01:37:18.00
Inhalt: Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization''s network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building''s perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Umfang: 02:00:07
Inhalt: The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, instructor Lisa Bock details what's actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email. Umfang: 01:38:41.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and provides a demonstration of a typical SSL transaction. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 01:45:09.00
Inhalt: Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Umfang: 02:03:46
Inhalt: Ransomware, a form of malware, is a threat to everyone. It spreads through phishing or other methods that get the victim to click a link. To avoid an attack, good security practices are important, both at home and at the office. The course provides an overview of the types of ransomware, including onion and mobile ransomware, and covers ways of safeguarding a Windows computer from risks. It is designed not just for IT pros, but anyone who wants to protect against ransomware and other types of cyberattacks. Security professional Lisa Bock covers best practices for securing routers, updating your software, strengthening passwords, identifying spam and other forms of social engineering, and reporting ransomware attacks to authorities. She closes with some simple ways that you can prevent your network from becoming infected, including a tabletop exercise to help your organization test your response to attacks. Umfang: 01:37:04.00
Inhalt: Today, when you make a call, you are most likely using Voice over IP (VoIP). VoIP uses the existing internet and network to transfer and route voice traffic in IP packets. In many cases, it is a part of a Unified Communications (UC) system, which integrates VoIP, video, email, and instant messaging into one seamless business application. In this course, learn about UC and its many layers so you can integrate UC and VoIP into your business network. Instructor Lisa Bock compares the traditional Public Switched Telephone Network (PSTN) to VoIP and discusses the components necessary for VoIP to be possible. Lisa reviews digital codecs, protocols for data transport, and intermediary systems such as translators and mixers. Lisa then reviews business integration and the importance of conducting a network assessment prior to implementation. Lisa wraps up with a discussion on how ensuring quality of service (QoS) in a VoIP network minimizes latency and jitter and the importance of VoIP security. Umfang: 01:08:59.00
Inhalt: The Internet of Things (IoT) is how devices on the Internet communicate through omnipresent sensors. Since its inception, consumers have connected smart devices to the network at an exponential rate, bringing us closer to a future where everyday things all interconnect. In this course-the first in a series that focuses on securing the Internet of Things-you can get started with this essential concept. Lisa Bock kicks off the course with an overview of IoT, and the types of IoT devices designed to improve the quality of life in homes and businesses. Lisa covers different networks that range in size and purpose-LANS, WANS and PANS-and explains how businesses invest heavily in IoT in order to keep a competitive edge, going into IoT developments in automobiles, building automation, and the medical field. She then evaluates consumer devices, such as wearables and mobile devices. Plus, she discusses zero-configuration networking, service discovery, designing IoT security, and more. Umfang: 01:29:51.00
Inhalt: The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT. Umfang: 01:54:59.00
Inhalt: Learn how to capture and analyze network traffic with Wireshark, a free, open-source packet analysis tool, and identify congestion issues, suspicious activity, and network intrusions. In this course, Lisa Bock reviews the fundamental concepts underlying Wireshark, such as network analysis and the OSI model, and examines some example packet captures so you can start to understand field values and compare normal to abnormal network behaviors. You'll also be introduced to common attack signatures, display and capture filters, and protocols such as HTTP, TCP, DNS, and FTP. Umfang: 02:35:54.00
Inhalt: Wireshark Essential Training provides a solid overview of deep packet inspection by stepping through the basics of packet capture and analysis using Wireshark. In this course, Lisa Bock helps you understand the field values of the protocols and what's considered normal behavior using precaptured packets from online repositories. Lisa helps you navigate through the many features of Wireshark. She begins by stressing the benefits of traffic analysis and discussing how this powerful tool can be used to examine traffic either live from wired or wireless connections. She compares the legacy and next generation versions of Wireshark, demonstrates how to install this tool on a PC and on a Mac, and explores the Wireshark interface. She then moves into deep packet analysis of common protocols such as TCP, IP, DHCP, and DNS. To wrap up, she summarizes working with packet captures, discusses the Wireshark expert system, and goes over how Wireshark can help detect network latency issues. She also illustrates ways to subset traffic and then share captures using CloudShark. Lisa walks participants through the basics, so no previous experience with Wireshark is necessary. Umfang: 02:25:06.00
Inhalt: Enhance your Wireshark skillset by picking up some more sophisticated tools and techniques. In this course, instructor Lisa Bock takes a deep dive into advanced topics such as tapping into the stream, merging and sanitizing packet captures, capture engines, optimizing packet capture, and IO and stream graphs. Lisa begins with a review of network architecture. She covers ways to solve network problems, merge traffic, and sanitize captures before sharing, along with capturing session keys to decrypt traffic. She then reviews capture engines along with a discussion on wireless traffic. She reviews CLI capture-a more lightweight option that's not resource intensive-and goes over IO graphs and TCP stream graphs, which can provide you with a closer look at traffic trends and round-trip time. Umfang: 01:49:03.00
Inhalt: Speed up your workflow and enhance your analysis by becoming better acquainted with the Wireshark interface and its core features. In this course, join Lisa Bock as she helps to familiarize you with this powerful protocol analysis tool. Lisa reviews the menu choices, explains each of the toolbars available, and shares tips for modifying the Wireshark interface to suit your needs. Discover capture options and understand the difference between capture and display filters. Learn how to efficiently find and mark packets, and fine-tune columns, fonts, and colors. Create configuration protocols and easily add comments to a single packet or to the entire capture, all with the goal of helping you navigate easier in Wireshark. Umfang: 01:41:44.00
Inhalt: Security devices on a network scoop up traffic and then analyze the field values to allow or deny specific traffic. As smart as the devices are, there are times when some threats slip through the cracks. Wireshark is a free protocol analysis tool that is used to baseline a network, actively monitor changes, identify common attack signatures, build firewall rules, detect issues, and quickly remove threats from the network. This course covers how to use Wireshark for deep packet analysis, capturing, and forensics. Learn how to keep your networks secure against malware and cyberattacks by implementing solutions that detect and handle unusual traffic. Umfang: 01:52:49.00
Inhalt: Learn how to analyze network problems with Wireshark, a free, open-source packet analysis tool used by network administrators around the world. In this course, Lisa Bock demonstrates how to get the most out of Wireshark, so that you can better evaluate your network and keep traffic moving. You can discover how to use time as a metric for visualizing delays. In addition, you can get an introduction to some of the most helpful tools within Wireshark, such as TCP, I/O, and flow graphs. Finally, learn how to visualize transmission errors and recognize common attack signatures. Umfang: 01:30:35
Inhalt: Learn how to use Wireshark, the powerful protocol analysis tool, to deal with packet loss and recovery, so you can keep traffic moving. Instructor Lisa Bock begins by reviewing normal traffic, comparing TCP, a connection-oriented protocol, with UDP, a lightweight connectionless protocol. She then moves into discussing network latency, packet loss, and throughput; TCP and UDP packet loss recovery; misconfiguration issues that can cause an interruption of end user experience, along with malware; and more. Umfang: 01:23:09.00
Inhalt: Voice over IP (VoIP) is a technology that sends voice data in packets using the IP network-allowing you to make calls using an internet connection instead of a traditional phone line. In this course, join Lisa Bock as she takes an in-depth look at VoIP protocols and components, as well as how to troubleshoot VoIP calls. Lisa begins with an overview of VoIP, discussing its uses, codecs, and components. She then reviews the protocols that make VoIP possible, including TCP/IP, Skinny Client Control Protocol (SCCP) and the H.323 family. She provides a review of media gateways and network operations, including quality of service and DNS, that are critical to the success of VoIP. To wrap up, Lisa dives into Wireshark statistics, showing how to leverage these statistics to troubleshoot VoIP. Umfang: 01:42:23.00
Programm Findus Internet-OPAC findus.pl V20.236/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 17.05.2024, 12:10 Uhr. 2.972 Zugriffe im Mai 2024. Insgesamt 513.202 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral