Hey there, great course, right? Do you like this course?

All of the most interesting lessons further. In order to continue you just need to purchase it

Course sections

Secure Network Access Visibility and Enforcement, Lecture 5

Lesson 5: Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

Lesson is locked. Please Buy course to proceed.

Secure Network Access Visibility and Enforcement, Lecture 4 Lesson 4: Describe the benefits of device compliance and application control
Complete
Secure Network Access Visibility and Enforcement, Lecture 6 Lesson 6: Describe the benefits of network telemetry