02. Cisco CyberOps Security Monitoring
- 收录时间:2021-07-27 19:15:31
- 文件大小:258MB
- 下载次数:1
- 最近下载:2021-07-27 19:15:31
- 磁力链接:
-
文件列表
- 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4 25MB
- 04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4 16MB
- 05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4 14MB
- 04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4 13MB
- 05. Concealing the Attack/02. Reducing Visibility Through Security.mp4 13MB
- 03. Discovering Common Attacks/06. Directory Traversal Demo.mp4 12MB
- 06. Using Certificates for Security/05. Analyzing Certificates.mp4 10MB
- Exercise.zip 10MB
- 04. Identifying Data Types and Uses/02. Learning About Data types.mp4 9MB
- 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4 8MB
- 02. Learning About the Attack Surface/04. Network Attacks.mp4 8MB
- 04. Identifying Data Types and Uses/05. Additional Data to Use.mp4 8MB
- 02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4 8MB
- 03. Discovering Common Attacks/02. Social Engineering.mp4 8MB
- 02. Learning About the Attack Surface/02. Getting Started.mp4 8MB
- 02. Learning About the Attack Surface/05. Attack Demo.mp4 7MB
- 03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4 7MB
- 06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4 7MB
- 03. Discovering Common Attacks/03. Social Engineering Demo.mp4 7MB
- 06. Using Certificates for Security/04. Certificate Components.mp4 7MB
- 03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4 6MB
- 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4 6MB
- 04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4 5MB
- 06. Using Certificates for Security/01. Introduction to Certificates.mp4 5MB
- 06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4 5MB
- 03. Discovering Common Attacks/05. Web Application Attacks.mp4 5MB
- 02. Learning About the Attack Surface/01. Course Introduction.mp4 4MB
- 01. Course Overview/01. Course Overview.mp4 3MB
- 06. Using Certificates for Security/06. Lets Wrap!.mp4 3MB
- 05. Concealing the Attack/01. Introduction to Concealment.mp4 3MB
- 02. Learning About the Attack Surface/06. Closing It Out!.mp4 2MB
- 04. Identifying Data Types and Uses/07. Module Review.mp4 2MB
- 03. Discovering Common Attacks/07. Wrapping up Attacks.mp4 2MB
- 05. Concealing the Attack/06. Concealment Review.mp4 2MB
- 05. Concealing the Attack/02. Reducing Visibility Through Security.srt 12KB
- 02. Learning About the Attack Surface/02. Getting Started.srt 8KB
- 02. Learning About the Attack Surface/04. Network Attacks.srt 8KB
- 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt 8KB
- 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt 7KB
- 06. Using Certificates for Security/02. Certificate Functions and Terminology.srt 7KB
- 03. Discovering Common Attacks/02. Social Engineering.srt 7KB
- 04. Identifying Data Types and Uses/02. Learning About Data types.srt 7KB
- 06. Using Certificates for Security/05. Analyzing Certificates.srt 7KB
- 02. Learning About the Attack Surface/05. Attack Demo.srt 7KB
- 03. Discovering Common Attacks/04. Endpoint-based Attacks.srt 6KB
- 03. Discovering Common Attacks/06. Directory Traversal Demo.srt 6KB
- 04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt 6KB
- 04. Identifying Data Types and Uses/05. Additional Data to Use.srt 6KB
- 06. Using Certificates for Security/04. Certificate Components.srt 6KB
- 03. Discovering Common Attacks/01. The MITRE Attack Framework.srt 5KB
- 04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt 5KB
- 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt 5KB
- 06. Using Certificates for Security/01. Introduction to Certificates.srt 5KB
- 06. Using Certificates for Security/03. Whats the Impact of Certificates.srt 5KB
- 03. Discovering Common Attacks/03. Social Engineering Demo.srt 5KB
- 05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt 5KB
- 03. Discovering Common Attacks/05. Web Application Attacks.srt 4KB
- 02. Learning About the Attack Surface/01. Course Introduction.srt 4KB
- 06. Using Certificates for Security/06. Lets Wrap!.srt 4KB
- 02. Learning About the Attack Surface/03. Whats an Attack Surface.srt 4KB
- 05. Concealing the Attack/01. Introduction to Concealment.srt 3KB
- 02. Learning About the Attack Surface/06. Closing It Out!.srt 3KB
- 04. Identifying Data Types and Uses/01. Introducing Data Sources.srt 3KB
- 01. Course Overview/01. Course Overview.srt 2KB
- 03. Discovering Common Attacks/07. Wrapping up Attacks.srt 2KB
- 04. Identifying Data Types and Uses/07. Module Review.srt 2KB
- 05. Concealing the Attack/06. Concealment Review.srt 2KB