Caleb Sargeant's Docs
latest
Networking
Cisco
Core Security
Security Concepts
Network Security Fundamentals
Fundamentals from the Book
Network Security with Cisco IOS
Network Security with Cisco ASA
Network Security with Cisco Firepower
Describing and Configuring VPNs
Secure Network Access, Visibility, and Enforcement
Explaining Exfiltration Techniques
Describing the Benefits of Network Telemetry
Benefitting from Additional Cisco Security Products
Implementing Cisco Application Visibility and Control (AVC)
Secure Network Access Using Cisco ISE
Endpoint Protection and Detection with Cisco AMP
Content Security with Cisco WSA & Cisco Umbrella
Email Security with Cisco ESA
Routing
Switching
MPLS
NGFW & NGIPS
DevNet Day
ACI
ASA
ASAv
DNA
General
Genie
ISE
Nexus
NSO
VIRL
Mikrotik
FortiGate
HP Procurve
Juniper
Ubiquiti UniFi
NetDevOps Tool Chest
Computing
Ansible
Bamboo
Cloud
Docker
Kubernetes
DNS
ELK Stack
Jenkins
Linux
Pentesting
Terraform
Microsoft
Programming
Bash
Python
Other
API
General
iPerf3
Caleb Sargeant's Docs
Docs
»
Cisco
»
Core Security
»
Secure Network Access, Visibility, and Enforcement
Edit on GitHub
Secure Network Access, Visibility, and Enforcement
¶
Explaining Exfiltration Techniques
Exfiltrating Data Using DNS, NTP, ICMP, or IRC
DNS Tunneling
NTP Covert Channels
ICMP Echo Manipulation
Internet Relay Chat
Exfiltrating Data Using HTTPS, FTP, SFTP, SSH, or SCP
HTTPs
FTP SFTP SCP
Exfiltrating Data Using Email
Email Security
Describing the Benefits of Network Telemetry
Introduction to Network Telemetry
Network Telemetry
Information That Makes up Network Telemetry
Management Plane Protocols
Control Plane Protocols
Data Plane Protocols
Intro to Data Models and YANG
Data Model
Attributes of a Good Data Model
YANG
Intro to NETCONF, RESTCONF, and gRPC
NETCONF
RESTCONF
gRPC and gNMI
Dial-In vs Dial-Out
Benefitting from Additional Cisco Security Products
Cisco Stealthwatch
Stealthwatch Components
AnyConnect Network Visibility Module and Stealthwatch Cloud
Network Visibility Module
Stealthwatch Cloud
Stealthwatch Cloud Modeling
Cognitive Threat Analytics and Encrypted Traffic Analytics
Cognitive Threat Analytics
Encrypted Traffic Analytics
Cisco PxGrid
pxGrid Ecosystem
Adaptive Network Control
Rapid Threat Containment
Cisco Umbrella Investigate
What Does It Do?
Guilt?
Implementing Cisco Application Visibility and Control (AVC)
Introduction to Cisco’s Application Visibility and Control
Why Do We Need AVC?
Application Visibility and Control
Controlling Application Traffic Using Policy Maps
QoS Concepts
Configuring a Switch to Capture and Send Flows