01. Cisco CyberOps Exploring Security Concepts
- 收录时间:2021-08-30 16:04:44
- 文件大小:185MB
- 下载次数:1
- 最近下载:2021-08-30 16:04:44
- 磁力链接:
-
文件列表
- 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22MB
- 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12MB
- 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11MB
- 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 11MB
- 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10MB
- 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 10MB
- 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9MB
- 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9MB
- 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9MB
- 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 9MB
- 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8MB
- 03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 8MB
- 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7MB
- 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6MB
- 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5MB
- 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5MB
- 04. Explaining Cybersecurity Challenges/01. Introduction.mp4 5MB
- Exercise.zip 5MB
- 02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4MB
- 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4MB
- 01. Course Overview/01. Course Overview.mp4 4MB
- 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3MB
- 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3MB
- 03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2MB
- 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2MB
- 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.srt 10KB
- 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.srt 9KB
- 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.srt 9KB
- 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.srt 9KB
- 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.srt 8KB
- 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.srt 8KB
- 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.srt 8KB
- 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.srt 8KB
- 03. Identifying Common Cybersecurity Concepts/02. Risk Management.srt 7KB
- 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.srt 7KB
- 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.srt 7KB
- 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.srt 6KB
- 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.srt 6KB
- 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.srt 6KB
- 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.srt 5KB
- 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.srt 5KB
- 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.srt 4KB
- 02. Defining Cybersecurity What Is It Anyway/01. Introduction.srt 4KB
- 04. Explaining Cybersecurity Challenges/01. Introduction.srt 4KB
- 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.srt 4KB
- 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.srt 3KB
- 03. Identifying Common Cybersecurity Concepts/01. Introduction.srt 3KB
- 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.srt 3KB
- 01. Course Overview/01. Course Overview.srt 2KB