05. Cisco CyberOps Managing Policies and Procedures
- 收录时间:2021-09-24 19:21:45
- 文件大小:272MB
- 下载次数:1
- 最近下载:2021-09-24 19:21:45
- 磁力链接:
-
文件列表
- 04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4 29MB
- 05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4 25MB
- 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4 22MB
- 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4 19MB
- 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4 15MB
- 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4 14MB
- 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4 13MB
- 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4 12MB
- 04. Applying the Incident Response Process/03. The Incident Response Steps.mp4 11MB
- 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4 10MB
- Exercise.zip 10MB
- 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4 9MB
- 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4 9MB
- 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4 9MB
- 05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4 8MB
- 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4 8MB
- 04. Applying the Incident Response Process/04. The IR Team.mp4 7MB
- 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4 7MB
- 05. Classifying Intrusion Events/04. Putting It All together.mp4 7MB
- 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4 6MB
- 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4 6MB
- 03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4 5MB
- 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4 4MB
- 04. Applying the Incident Response Process/06. Collecting Evidence.mp4 4MB
- 01. Course Overview/01. Course Overview.mp4 3MB
- 04. Applying the Incident Response Process/03. The Incident Response Steps.srt 10KB
- 04. Applying the Incident Response Process/05. Incident Response in the Lab.srt 10KB
- 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.srt 9KB
- 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.srt 9KB
- 05. Classifying Intrusion Events/03. Practicing Event Mapping.srt 9KB
- 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.srt 9KB
- 05. Classifying Intrusion Events/02. Mapping Events to the Models.srt 8KB
- 04. Applying the Incident Response Process/04. The IR Team.srt 8KB
- 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.srt 7KB
- 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.srt 7KB
- 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.srt 7KB
- 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.srt 7KB
- 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.srt 7KB
- 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.srt 7KB
- 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.srt 7KB
- 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.srt 6KB
- 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.srt 6KB
- 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.srt 5KB
- 05. Classifying Intrusion Events/04. Putting It All together.srt 5KB
- 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.srt 5KB
- 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.srt 5KB
- 03. Identifying Assets and Critical Data/09. Protecting Critical Data.srt 4KB
- 04. Applying the Incident Response Process/06. Collecting Evidence.srt 4KB
- 01. Course Overview/01. Course Overview.srt 2KB