589689.xyz

01. Cisco CyberOps Exploring Security Concepts

  • 收录时间:2021-08-30 16:04:44
  • 文件大小:185MB
  • 下载次数:1
  • 最近下载:2021-08-30 16:04:44
  • 磁力链接:

文件列表

  1. 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22MB
  2. 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12MB
  3. 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11MB
  4. 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 11MB
  5. 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10MB
  6. 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 10MB
  7. 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9MB
  8. 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9MB
  9. 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9MB
  10. 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 9MB
  11. 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8MB
  12. 03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 8MB
  13. 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7MB
  14. 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6MB
  15. 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5MB
  16. 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5MB
  17. 04. Explaining Cybersecurity Challenges/01. Introduction.mp4 5MB
  18. Exercise.zip 5MB
  19. 02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4MB
  20. 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4MB
  21. 01. Course Overview/01. Course Overview.mp4 4MB
  22. 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3MB
  23. 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3MB
  24. 03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2MB
  25. 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2MB
  26. 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.srt 10KB
  27. 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.srt 9KB
  28. 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.srt 9KB
  29. 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.srt 9KB
  30. 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.srt 8KB
  31. 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.srt 8KB
  32. 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.srt 8KB
  33. 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.srt 8KB
  34. 03. Identifying Common Cybersecurity Concepts/02. Risk Management.srt 7KB
  35. 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.srt 7KB
  36. 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.srt 7KB
  37. 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.srt 6KB
  38. 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.srt 6KB
  39. 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.srt 6KB
  40. 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.srt 5KB
  41. 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.srt 5KB
  42. 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.srt 4KB
  43. 02. Defining Cybersecurity What Is It Anyway/01. Introduction.srt 4KB
  44. 04. Explaining Cybersecurity Challenges/01. Introduction.srt 4KB
  45. 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.srt 4KB
  46. 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.srt 3KB
  47. 03. Identifying Common Cybersecurity Concepts/01. Introduction.srt 3KB
  48. 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.srt 3KB
  49. 01. Course Overview/01. Course Overview.srt 2KB