589689.xyz

Cisco CyberOps Associate (200-201)

  • 收录时间:2025-01-13 04:19:16
  • 文件大小:4GB
  • 下载次数:1
  • 最近下载:2025-01-13 04:19:16
  • 磁力链接:

文件列表

  1. Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.mp4 131MB
  2. Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.mp4 119MB
  3. Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.mp4 118MB
  4. Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.mp4 114MB
  5. Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.mp4 111MB
  6. Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.mp4 109MB
  7. Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.mp4 106MB
  8. Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.mp4 106MB
  9. Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.mp4 106MB
  10. Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.mp4 105MB
  11. Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.mp4 101MB
  12. Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.mp4 100MB
  13. Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.mp4 97MB
  14. Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.mp4 97MB
  15. Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.mp4 97MB
  16. Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.mp4 95MB
  17. Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.mp4 92MB
  18. Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.mp4 92MB
  19. Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.mp4 91MB
  20. Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.mp4 90MB
  21. Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.mp4 89MB
  22. Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.mp4 89MB
  23. Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.mp4 89MB
  24. Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.mp4 88MB
  25. Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.mp4 87MB
  26. Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.mp4 86MB
  27. Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.mp4 86MB
  28. Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.mp4 86MB
  29. Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.mp4 86MB
  30. Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.mp4 85MB
  31. Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.mp4 84MB
  32. Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.mp4 84MB
  33. Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.mp4 83MB
  34. Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.mp4 83MB
  35. Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.mp4 82MB
  36. Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.mp4 79MB
  37. Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.mp4 79MB
  38. Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.mp4 78MB
  39. Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.mp4 77MB
  40. Chapter 1 Cybersecurity Operations Essentials/001. Overview.mp4 77MB
  41. Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.mp4 76MB
  42. Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.mp4 75MB
  43. Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.mp4 72MB
  44. Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.mp4 70MB
  45. Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.mp4 63MB
  46. Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.mp4 62MB
  47. Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.mp4 59MB
  48. Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.mp4 53MB
  49. Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.en.srt 35KB
  50. Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.en.srt 34KB
  51. Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.en.srt 33KB
  52. Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.en.srt 33KB
  53. Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.en.srt 33KB
  54. Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.en.srt 33KB
  55. Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.en.srt 33KB
  56. Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.en.srt 32KB
  57. Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.en.srt 31KB
  58. Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.en.srt 31KB
  59. Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.en.srt 31KB
  60. Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.en.srt 31KB
  61. Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.en.srt 30KB
  62. Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.en.srt 30KB
  63. Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.en.srt 30KB
  64. Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.en.srt 30KB
  65. Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.en.srt 29KB
  66. Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.en.srt 29KB
  67. Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.en.srt 29KB
  68. Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.en.srt 29KB
  69. Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.en.srt 29KB
  70. Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.en.srt 29KB
  71. Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.en.srt 29KB
  72. Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.en.srt 28KB
  73. Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.en.srt 28KB
  74. Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.en.srt 27KB
  75. Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.en.srt 27KB
  76. Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.en.srt 27KB
  77. Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.en.srt 27KB
  78. Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.en.srt 26KB
  79. Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.en.srt 26KB
  80. Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.en.srt 26KB
  81. Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.en.srt 25KB
  82. Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.en.srt 25KB
  83. Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.en.srt 25KB
  84. Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.en.srt 24KB
  85. Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.en.srt 24KB
  86. Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.en.srt 24KB
  87. Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.en.srt 24KB
  88. Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.en.srt 23KB
  89. Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.en.srt 20KB
  90. Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.en.srt 20KB
  91. Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.en.srt 20KB
  92. Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.en.srt 19KB
  93. Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.en.srt 19KB
  94. Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.en.srt 17KB
  95. Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.en.srt 15KB
  96. Chapter 1 Cybersecurity Operations Essentials/001. Overview.en.srt 13KB