589689.xyz

[Pluralsight] Cisco CyberOps

  • 收录时间:2022-04-17 20:57:39
  • 文件大小:1GB
  • 下载次数:1
  • 最近下载:2022-04-17 20:57:39
  • 磁力链接:

文件列表

  1. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/smb_file_transfer.pcapng 40MB
  2. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/smb_file_transfer.pcapng 40MB
  3. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4 29MB
  4. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.mp4 26MB
  5. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4 25MB
  6. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4 25MB
  7. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/03. Using Wireshark for File Extraction.mp4 25MB
  8. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/06. Examining Additional Network Data Sources.mp4 25MB
  9. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/04. Exploring More Network Protocols.mp4 25MB
  10. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/04. Examining More Network Data Sources.mp4 24MB
  11. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/04. Reporting.mp4 24MB
  12. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4 22MB
  13. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22MB
  14. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/02. Identifying Elements in a Datagram.mp4 22MB
  15. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/05. Understanding Network Protocols.mp4 21MB
  16. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/07. Seeing the Raw Traffic.mp4 20MB
  17. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4 19MB
  18. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.mp4 19MB
  19. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/05. Comparing Raw Traffic with Netflow.mp4 19MB
  20. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.mp4 19MB
  21. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/03. Examining Network Data Sources.mp4 19MB
  22. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/06. Analyzing Netflow Information.mp4 18MB
  23. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/06. Wrapping up Network Protocols.mp4 18MB
  24. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/03. Investigating Network Security Device Alerts.mp4 17MB
  25. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/03. Exploring the Common Network Protocols.mp4 16MB
  26. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4 16MB
  27. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/02. Exploring Artifacts in Splunk.mp4 16MB
  28. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.mp4 15MB
  29. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4 15MB
  30. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.mp4 15MB
  31. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/01. Seeing Threats from the Network.mp4 14MB
  32. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4 14MB
  33. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.mp4 14MB
  34. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4 14MB
  35. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4 13MB
  36. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/06. Tampering with Disk Images.mp4 13MB
  37. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/02. Reducing Visibility Through Security.mp4 13MB
  38. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4 13MB
  39. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/Sample Logs.csv 13MB
  40. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/Sample Logs.csv 13MB
  41. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12MB
  42. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/06. Directory Traversal Demo.mp4 12MB
  43. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4 12MB
  44. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11MB
  45. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/03. The Incident Response Steps.mp4 11MB
  46. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/02. Inspecting Packets.mp4 11MB
  47. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 11MB
  48. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/01. Gathering Traffic Information.mp4 10MB
  49. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/05. Analyzing Certificates.mp4 10MB
  50. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10MB
  51. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.mp4 10MB
  52. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4 10MB
  53. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/05. Other Network Data Sources.mp4 10MB
  54. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 10MB
  55. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4 9MB
  56. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9MB
  57. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4 9MB
  58. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9MB
  59. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9MB
  60. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/05. Finding the Evidence.mp4 9MB
  61. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 9MB
  62. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4 9MB
  63. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/04. Stateful Firewalls and DPI.mp4 9MB
  64. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/01. Introducing Host-based Analysis.mp4 9MB
  65. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/02. Learning About Data types.mp4 9MB
  66. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4 8MB
  67. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4 8MB
  68. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8MB
  69. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4 8MB
  70. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/04. Network Attacks.mp4 8MB
  71. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/05. Additional Data to Use.mp4 8MB
  72. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4 8MB
  73. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/02. Social Engineering.mp4 8MB
  74. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/02. Getting Started.mp4 8MB
  75. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 8MB
  76. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.mp4 8MB
  77. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/05. Attack Demo.mp4 7MB
  78. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4 7MB
  79. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/smtp.pcapng 7MB
  80. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/smtp.pcapng 7MB
  81. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4 7MB
  82. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7MB
  83. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/04. The IR Team.mp4 7MB
  84. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/02. Network Data Sources Syslog and Telemetry.mp4 7MB
  85. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/01. Exploring Key Datagram Elements.mp4 7MB
  86. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/03. Social Engineering Demo.mp4 7MB
  87. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4 7MB
  88. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/04. Putting It All together.mp4 7MB
  89. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/04. Certificate Components.mp4 7MB
  90. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/02. Investigation Terminology.mp4 7MB
  91. 04. Cisco CyberOps Analyzing the Network/Exercise/03/inspecting-network-traffic-slides.pdf 7MB
  92. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/03. Antimalware and Antivirus.mp4 6MB
  93. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/05. Putting It All Together.mp4 6MB
  94. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6MB
  95. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4 6MB
  96. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/04. Systems-based Sandboxing.mp4 6MB
  97. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/08. Impacts of Positive and Negative Detections.mp4 6MB
  98. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/01. Malware Analysis.mp4 6MB
  99. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4 6MB
  100. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4 6MB
  101. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4 6MB
  102. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.mp4 6MB
  103. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.mp4 5MB
  104. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5MB
  105. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.mp4 5MB
  106. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.mp4 5MB
  107. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5MB
  108. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/04. Investigation Evidence.mp4 5MB
  109. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/05. Application Allow and Block Lists.mp4 5MB
  110. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/03. Attack Attribution.mp4 5MB
  111. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4 5MB
  112. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/01. Introduction to Certificates.mp4 5MB
  113. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4 5MB
  114. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/01. Introduction.mp4 5MB
  115. 05. Cisco CyberOps Managing Policies and Procedures/Exercise/04/applying-the-incident-response-process-slides.pdf 5MB
  116. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4 5MB
  117. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/02. Malware Analysis Tools.mp4 5MB
  118. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/05. Web Application Attacks.mp4 5MB
  119. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4MB
  120. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/01. Course Introduction.mp4 4MB
  121. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4MB
  122. 04. Cisco CyberOps Analyzing the Network/Exercise/02/analyzing-network-events-and-data-slides.pdf 4MB
  123. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/02. Host-based IDS and Firewalls.mp4 4MB
  124. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/06. Lets Wrap!.mp4 4MB
  125. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4 4MB
  126. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/01. Examining Artifacts in Alerts.mp4 4MB
  127. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/06. Collecting Evidence.mp4 4MB
  128. 04. Cisco CyberOps Analyzing the Network/01. Course Overview/01. Course Overview.mp4 4MB
  129. 03. Cisco CyberOps Analyzing Hosts/Exercise/02/securing-the-host-slides.pdf 4MB
  130. 01. Cisco CyberOps Exploring Security Concepts/01. Course Overview/01. Course Overview.mp4 4MB
  131. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/04. Interpreting Basic Regular Expressions.mp4 3MB
  132. 02. Cisco CyberOps Security Monitoring/01. Course Overview/01. Course Overview.mp4 3MB
  133. 02. Cisco CyberOps Security Monitoring/Exercise/05/concealing-the-attack-slides.pdf 3MB
  134. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3MB
  135. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3MB
  136. 05. Cisco CyberOps Managing Policies and Procedures/Exercise/03/identifying-assets-and-critical-data-slides.pdf 3MB
  137. 05. Cisco CyberOps Managing Policies and Procedures/01. Course Overview/01. Course Overview.mp4 3MB
  138. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/06. Lets Wrap!.mp4 3MB
  139. 03. Cisco CyberOps Analyzing Hosts/01. Course Overview/01. Course Overview.mp4 3MB
  140. 02. Cisco CyberOps Security Monitoring/Exercise/03/discovering-common-attacks-slides.pdf 3MB
  141. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/01. Introduction to Concealment.mp4 3MB
  142. 02. Cisco CyberOps Security Monitoring/Exercise/04/identifying-data-types-and-uses-slides.pdf 3MB
  143. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/05. Putting It All Together.mp4 3MB
  144. 01. Cisco CyberOps Exploring Security Concepts/Exercise/02/defining-cybersecurity-what-is-it-anyway-slides.pdf 2MB
  145. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/06. Closing It Out!.mp4 2MB
  146. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2MB
  147. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/01. Investigating an Attack.mp4 2MB
  148. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2MB
  149. 03. Cisco CyberOps Analyzing Hosts/Exercise/05/investigating-an-attack-slides.pdf 2MB
  150. 03. Cisco CyberOps Analyzing Hosts/Exercise/04/understanding-linux-security-components-and-log-usage-slides.pdf 2MB
  151. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.mp4 2MB
  152. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/07. Wrapping up Investigations.mp4 2MB
  153. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.mp4 2MB
  154. 05. Cisco CyberOps Managing Policies and Procedures/Exercise/05/classifying-intrusion-events-slides.pdf 2MB
  155. 01. Cisco CyberOps Exploring Security Concepts/Exercise/04/explaining-cybersecurity-challenges-slides.pdf 2MB
  156. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/07. Module Review.mp4 2MB
  157. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/07. Wrapping up Attacks.mp4 2MB
  158. 02. Cisco CyberOps Security Monitoring/Exercise/06/using-certificates-for-security-slides.pdf 2MB
  159. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/06. Concealment Review.mp4 2MB
  160. 02. Cisco CyberOps Security Monitoring/Exercise/02/learning-about-the-attack-surface-slides.pdf 1MB
  161. 05. Cisco CyberOps Managing Policies and Procedures/Exercise/02/understanding-cyber-management-concepts-slides.pdf 1MB
  162. 01. Cisco CyberOps Exploring Security Concepts/Exercise/03/identifying-common-cybersecurity-concepts-slides.pdf 1MB
  163. 03. Cisco CyberOps Analyzing Hosts/Exercise/03/identifying-and-interpreting-windows-components-and-logs-slides.pdf 1MB
  164. 03. Cisco CyberOps Analyzing Hosts/Exercise/06/using-malware-analysis-tools-slides.pdf 1021KB
  165. 04. Cisco CyberOps Analyzing the Network/Exercise/04/analyzing-raw-data-slides.pdf 884KB
  166. 04. Cisco CyberOps Analyzing the Network/Exercise/05/interpreting-alerts-and-event-elements-slides.pdf 849KB
  167. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/tls.pcapng 666KB
  168. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/tls.pcapng 666KB
  169. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/02. Reducing Visibility Through Security.srt 12KB
  170. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/03. Using Wireshark for File Extraction.srt 11KB
  171. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/03. The Incident Response Steps.srt 10KB
  172. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/05. Incident Response in the Lab.srt 10KB
  173. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/05. Comparing Raw Traffic with Netflow.srt 10KB
  174. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/02. Course Overview.srt 10KB
  175. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/01. Seeing Threats from the Network.srt 10KB
  176. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/04. Reporting.srt 10KB
  177. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/06. Examining Additional Network Data Sources.srt 9KB
  178. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.srt 9KB
  179. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/02. Creating an Incident Response Plan.srt 9KB
  180. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/04. Exploring More Network Protocols.srt 9KB
  181. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.srt 9KB
  182. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.srt 9KB
  183. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.srt 9KB
  184. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/05. Security Technologies.srt 9KB
  185. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/03. Practicing Event Mapping.srt 9KB
  186. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/02. Describing Management Concepts.srt 9KB
  187. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.srt 9KB
  188. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/02. Identifying Elements in a Datagram.srt 9KB
  189. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.srt 9KB
  190. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/01. Gathering Traffic Information.srt 9KB
  191. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.srt 8KB
  192. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.srt 8KB
  193. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.srt 8KB
  194. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/06. Analyzing Netflow Information.srt 8KB
  195. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.srt 8KB
  196. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/02. Getting Started.srt 8KB
  197. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/07. Seeing the Raw Traffic.srt 8KB
  198. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/04. Network Attacks.srt 8KB
  199. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/06. Tampering with Disk Images.srt 8KB
  200. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/04. Examining More Network Data Sources.srt 8KB
  201. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/05. Understanding Network Protocols.srt 8KB
  202. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/01. Introducing Host-based Analysis.srt 8KB
  203. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt 8KB
  204. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/telnet.pcapng 8KB
  205. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/telnet.pcapng 8KB
  206. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/03. Access Control Models.srt 8KB
  207. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/05. Other Network Data Sources.srt 8KB
  208. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/02. Mapping Events to the Models.srt 8KB
  209. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/03. Examining Network Data Sources.srt 8KB
  210. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/04. The IR Team.srt 8KB
  211. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/02. Risk Management.srt 7KB
  212. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.srt 7KB
  213. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.srt 7KB
  214. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.srt 7KB
  215. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt 7KB
  216. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/02. Certificate Functions and Terminology.srt 7KB
  217. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.srt 7KB
  218. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.srt 7KB
  219. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.srt 7KB
  220. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.srt 7KB
  221. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/04. Stateful Firewalls and DPI.srt 7KB
  222. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/02. Social Engineering.srt 7KB
  223. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/03. Exploring the Common Network Protocols.srt 7KB
  224. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/02. Learning About Data types.srt 7KB
  225. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/01. Understanding Frameworks and Models.srt 7KB
  226. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.srt 7KB
  227. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.srt 7KB
  228. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/05. Analyzing Certificates.srt 7KB
  229. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/05. Attack Demo.srt 7KB
  230. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.srt 7KB
  231. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/04. Endpoint-based Attacks.srt 6KB
  232. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/06. Directory Traversal Demo.srt 6KB
  233. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.srt 6KB
  234. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/02. Learning About Server Profiling.srt 6KB
  235. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/01. Exploring Key Datagram Elements.srt 6KB
  236. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/02. Network Data Sources Syslog and Telemetry.srt 6KB
  237. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.srt 6KB
  238. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.srt 6KB
  239. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt 6KB
  240. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/03. Investigating Network Security Device Alerts.srt 6KB
  241. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.srt 6KB
  242. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/02. Exploring Artifacts in Splunk.srt 6KB
  243. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/05. Additional Data to Use.srt 6KB
  244. 04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/02. Inspecting Packets.srt 6KB
  245. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.srt 6KB
  246. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/01. Malware Analysis.srt 6KB
  247. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/EIGRPv6.pcap 6KB
  248. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/EIGRPv6.pcap 6KB
  249. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/04. Certificate Components.srt 6KB
  250. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.srt 6KB
  251. 04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/06. Wrapping up Network Protocols.srt 6KB
  252. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/03. Antimalware and Antivirus.srt 6KB
  253. 04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/08. Impacts of Positive and Negative Detections.srt 5KB
  254. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/01. The MITRE Attack Framework.srt 5KB
  255. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/05. Finding the Evidence.srt 5KB
  256. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/01. Learning About the Incident Response Process.srt 5KB
  257. 05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/04. Putting It All together.srt 5KB
  258. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/netflow.pcapng 5KB
  259. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/netflow.pcapng 5KB
  260. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt 5KB
  261. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/02. Investigation Terminology.srt 5KB
  262. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/04. Systems-based Sandboxing.srt 5KB
  263. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/04. Investigation Evidence.srt 5KB
  264. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.srt 5KB
  265. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/03. Attack Attribution.srt 5KB
  266. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.srt 5KB
  267. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/pop.pcapng 5KB
  268. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/pop.pcapng 5KB
  269. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.srt 5KB
  270. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt 5KB
  271. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/01. Introduction to Certificates.srt 5KB
  272. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/05. Putting It All Together.srt 5KB
  273. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.srt 5KB
  274. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/03. Whats the Impact of Certificates.srt 5KB
  275. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/02. Malware Analysis Tools.srt 5KB
  276. 05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.srt 5KB
  277. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/06. Learning About Network Profiling.srt 5KB
  278. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/05. Application Allow and Block Lists.srt 5KB
  279. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/03. Social Engineering Demo.srt 5KB
  280. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt 5KB
  281. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/05. Web Application Attacks.srt 4KB
  282. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/01. Course Introduction.srt 4KB
  283. 05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/09. Protecting Critical Data.srt 4KB
  284. 05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/06. Collecting Evidence.srt 4KB
  285. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.srt 4KB
  286. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/08. Let's Wrap!.srt 4KB
  287. 02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/06. Lets Wrap!.srt 4KB
  288. 03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/02. Host-based IDS and Firewalls.srt 4KB
  289. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/01. Examining Artifacts in Alerts.srt 4KB
  290. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/03. Whats an Attack Surface.srt 4KB
  291. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/01. Introduction.srt 4KB
  292. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/01. Introduction.srt 4KB
  293. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.srt 4KB
  294. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/04. Traffic Profiles.srt 4KB
  295. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/01. Introduction to Concealment.srt 3KB
  296. 04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/04. Interpreting Basic Regular Expressions.srt 3KB
  297. 01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.srt 3KB
  298. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/05. Putting It All Together.srt 3KB
  299. 02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/06. Closing It Out!.srt 3KB
  300. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/01. Introducing Data Sources.srt 3KB
  301. 03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/06. Lets Wrap!.srt 3KB
  302. 01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/01. Introduction.srt 3KB
  303. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/http.pcapng 3KB
  304. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/http.pcapng 3KB
  305. 01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.srt 3KB
  306. 03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.srt 2KB
  307. 04. Cisco CyberOps Analyzing the Network/01. Course Overview/01. Course Overview.srt 2KB
  308. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/01. Investigating an Attack.srt 2KB
  309. 05. Cisco CyberOps Managing Policies and Procedures/01. Course Overview/01. Course Overview.srt 2KB
  310. 03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/07. Wrapping up Investigations.srt 2KB
  311. 01. Cisco CyberOps Exploring Security Concepts/01. Course Overview/01. Course Overview.srt 2KB
  312. 03. Cisco CyberOps Analyzing Hosts/01. Course Overview/01. Course Overview.srt 2KB
  313. 02. Cisco CyberOps Security Monitoring/01. Course Overview/01. Course Overview.srt 2KB
  314. 03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.srt 2KB
  315. 02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/07. Wrapping up Attacks.srt 2KB
  316. 02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/07. Module Review.srt 2KB
  317. 02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/06. Concealment Review.srt 2KB
  318. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/ICMPv6.pcap 1KB
  319. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/ICMPv6.pcap 1KB
  320. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/icmp.pcapng 1KB
  321. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/icmp.pcapng 1KB
  322. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/DNS.pcapng 696B
  323. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/DNS.pcapng 696B
  324. 04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/arp.pcapng 656B
  325. 04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/arp.pcapng 656B