589689.xyz

02. Cisco CyberOps Security Monitoring

  • 收录时间:2021-07-27 19:15:31
  • 文件大小:258MB
  • 下载次数:1
  • 最近下载:2021-07-27 19:15:31
  • 磁力链接:

文件列表

  1. 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4 25MB
  2. 04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4 16MB
  3. 05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4 14MB
  4. 04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4 13MB
  5. 05. Concealing the Attack/02. Reducing Visibility Through Security.mp4 13MB
  6. 03. Discovering Common Attacks/06. Directory Traversal Demo.mp4 12MB
  7. 06. Using Certificates for Security/05. Analyzing Certificates.mp4 10MB
  8. Exercise.zip 10MB
  9. 04. Identifying Data Types and Uses/02. Learning About Data types.mp4 9MB
  10. 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4 8MB
  11. 02. Learning About the Attack Surface/04. Network Attacks.mp4 8MB
  12. 04. Identifying Data Types and Uses/05. Additional Data to Use.mp4 8MB
  13. 02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4 8MB
  14. 03. Discovering Common Attacks/02. Social Engineering.mp4 8MB
  15. 02. Learning About the Attack Surface/02. Getting Started.mp4 8MB
  16. 02. Learning About the Attack Surface/05. Attack Demo.mp4 7MB
  17. 03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4 7MB
  18. 06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4 7MB
  19. 03. Discovering Common Attacks/03. Social Engineering Demo.mp4 7MB
  20. 06. Using Certificates for Security/04. Certificate Components.mp4 7MB
  21. 03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4 6MB
  22. 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4 6MB
  23. 04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4 5MB
  24. 06. Using Certificates for Security/01. Introduction to Certificates.mp4 5MB
  25. 06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4 5MB
  26. 03. Discovering Common Attacks/05. Web Application Attacks.mp4 5MB
  27. 02. Learning About the Attack Surface/01. Course Introduction.mp4 4MB
  28. 01. Course Overview/01. Course Overview.mp4 3MB
  29. 06. Using Certificates for Security/06. Lets Wrap!.mp4 3MB
  30. 05. Concealing the Attack/01. Introduction to Concealment.mp4 3MB
  31. 02. Learning About the Attack Surface/06. Closing It Out!.mp4 2MB
  32. 04. Identifying Data Types and Uses/07. Module Review.mp4 2MB
  33. 03. Discovering Common Attacks/07. Wrapping up Attacks.mp4 2MB
  34. 05. Concealing the Attack/06. Concealment Review.mp4 2MB
  35. 05. Concealing the Attack/02. Reducing Visibility Through Security.srt 12KB
  36. 02. Learning About the Attack Surface/02. Getting Started.srt 8KB
  37. 02. Learning About the Attack Surface/04. Network Attacks.srt 8KB
  38. 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt 8KB
  39. 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt 7KB
  40. 06. Using Certificates for Security/02. Certificate Functions and Terminology.srt 7KB
  41. 03. Discovering Common Attacks/02. Social Engineering.srt 7KB
  42. 04. Identifying Data Types and Uses/02. Learning About Data types.srt 7KB
  43. 06. Using Certificates for Security/05. Analyzing Certificates.srt 7KB
  44. 02. Learning About the Attack Surface/05. Attack Demo.srt 7KB
  45. 03. Discovering Common Attacks/04. Endpoint-based Attacks.srt 6KB
  46. 03. Discovering Common Attacks/06. Directory Traversal Demo.srt 6KB
  47. 04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt 6KB
  48. 04. Identifying Data Types and Uses/05. Additional Data to Use.srt 6KB
  49. 06. Using Certificates for Security/04. Certificate Components.srt 6KB
  50. 03. Discovering Common Attacks/01. The MITRE Attack Framework.srt 5KB
  51. 04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt 5KB
  52. 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt 5KB
  53. 06. Using Certificates for Security/01. Introduction to Certificates.srt 5KB
  54. 06. Using Certificates for Security/03. Whats the Impact of Certificates.srt 5KB
  55. 03. Discovering Common Attacks/03. Social Engineering Demo.srt 5KB
  56. 05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt 5KB
  57. 03. Discovering Common Attacks/05. Web Application Attacks.srt 4KB
  58. 02. Learning About the Attack Surface/01. Course Introduction.srt 4KB
  59. 06. Using Certificates for Security/06. Lets Wrap!.srt 4KB
  60. 02. Learning About the Attack Surface/03. Whats an Attack Surface.srt 4KB
  61. 05. Concealing the Attack/01. Introduction to Concealment.srt 3KB
  62. 02. Learning About the Attack Surface/06. Closing It Out!.srt 3KB
  63. 04. Identifying Data Types and Uses/01. Introducing Data Sources.srt 3KB
  64. 01. Course Overview/01. Course Overview.srt 2KB
  65. 03. Discovering Common Attacks/07. Wrapping up Attacks.srt 2KB
  66. 04. Identifying Data Types and Uses/07. Module Review.srt 2KB
  67. 05. Concealing the Attack/06. Concealment Review.srt 2KB