Cisco CyberOps Associate (200-201) 收录时间:2025-01-13 04:19:16 文件大小:4GB 下载次数:1 最近下载:2025-01-13 04:19:16 磁力链接: magnet:?xt=urn:btih:6138858f78c40975d8b0c4d003cf5025495f0d1d 立即下载 复制链接 文件列表 Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.mp4 131MB Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.mp4 119MB Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.mp4 118MB Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.mp4 114MB Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.mp4 111MB Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.mp4 109MB Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.mp4 106MB Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.mp4 106MB Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.mp4 106MB Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.mp4 105MB Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.mp4 101MB Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.mp4 100MB Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.mp4 97MB Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.mp4 97MB Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.mp4 97MB Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.mp4 95MB Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.mp4 92MB Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.mp4 92MB Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.mp4 91MB Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.mp4 90MB Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.mp4 89MB Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.mp4 89MB Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.mp4 89MB Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.mp4 88MB Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.mp4 87MB Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.mp4 86MB Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.mp4 86MB Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.mp4 86MB Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.mp4 86MB Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.mp4 85MB Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.mp4 84MB Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.mp4 84MB Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.mp4 83MB Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.mp4 83MB Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.mp4 82MB Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.mp4 79MB Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.mp4 79MB Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.mp4 78MB Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.mp4 77MB Chapter 1 Cybersecurity Operations Essentials/001. Overview.mp4 77MB Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.mp4 76MB Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.mp4 75MB Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.mp4 72MB Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.mp4 70MB Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.mp4 63MB Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.mp4 62MB Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.mp4 59MB Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.mp4 53MB Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.en.srt 35KB Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.en.srt 34KB Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.en.srt 33KB Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.en.srt 33KB Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.en.srt 33KB Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.en.srt 33KB Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.en.srt 33KB Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.en.srt 32KB Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.en.srt 31KB Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.en.srt 31KB Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.en.srt 31KB Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.en.srt 31KB Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.en.srt 30KB Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.en.srt 30KB Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.en.srt 30KB Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.en.srt 30KB Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.en.srt 29KB Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.en.srt 29KB Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.en.srt 29KB Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.en.srt 29KB Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.en.srt 29KB Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.en.srt 29KB Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.en.srt 29KB Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.en.srt 28KB Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.en.srt 28KB Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.en.srt 27KB Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.en.srt 27KB Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.en.srt 27KB Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.en.srt 27KB Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.en.srt 26KB Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.en.srt 26KB Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.en.srt 26KB Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.en.srt 25KB Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.en.srt 25KB Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.en.srt 25KB Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.en.srt 24KB Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.en.srt 24KB Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.en.srt 24KB Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.en.srt 24KB Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.en.srt 23KB Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.en.srt 20KB Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.en.srt 20KB Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.en.srt 20KB Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.en.srt 19KB Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.en.srt 19KB Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.en.srt 17KB Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.en.srt 15KB Chapter 1 Cybersecurity Operations Essentials/001. Overview.en.srt 13KB