Hey there, great course, right? Do you like this course?

All of the most interesting lessons further. In order to continue you just need to purchase it

Course sections

Secure Network Access Visibility and Enforcement, Lecture 4

Lesson 4: Describe the benefits of device compliance and application control

Lesson is locked. Please Buy course to proceed.

Secure Network Access Visibility and Enforcement, Lecture 3 Lesson 3: Describe network access with CoA
Complete
Secure Network Access Visibility and Enforcement, Lecture 5 Lesson 5: Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)