[ ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 2 Security Monitoring
- 收录时间:2022-02-10 23:04:39
- 文件大小:481MB
- 下载次数:1
- 最近下载:2022-02-10 23:04:39
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.mp4 27MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.mp4 26MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.mp4 20MB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.mp4 19MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.mp4 19MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.mp4 16MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.mp4 16MB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.mp4 16MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.mp4 15MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.mp4 15MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.mp4 15MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.mp4 14MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.mp4 14MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.mp4 13MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.mp4 13MB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.mp4 12MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.mp4 12MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.mp4 12MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.mp4 11MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.mp4 11MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.mp4 11MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.mp4 11MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.mp4 11MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.mp4 10MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.mp4 10MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.mp4 10MB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.mp4 9MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.mp4 8MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.mp4 8MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.mp4 7MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).mp4 7MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.mp4 7MB
- ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.mp4 7MB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.mp4 7MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.mp4 6MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.mp4 6MB
- ~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.mp4 6MB
- ~Get Your Files Here !/[1] Introduction/[1] Active security monitoring.mp4 6MB
- ~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4 5MB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.mp4 4MB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.mp4 4MB
- ~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.mp4 3MB
- ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.mp4 3MB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 02/CyOps 02 Netflow Demo.pka 639KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 04/BONUS_PTActA_ACL.pka 290KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 00/CyOps 02-Links.pdf 89KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 01/Challenge Social Engineering.pdf 30KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/Challenge Wireshark and DNS.pdf 29KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.srt 9KB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.srt 9KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.srt 9KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.srt 8KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.srt 8KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.srt 8KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.srt 8KB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.srt 7KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.srt 7KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.srt 7KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.srt 7KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.srt 7KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.srt 6KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.srt 6KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.srt 6KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.srt 6KB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.srt 6KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.srt 6KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.srt 6KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.srt 6KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.srt 6KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.srt 5KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.srt 5KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.srt 5KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.srt 4KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.srt 4KB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.srt 4KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.srt 4KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).srt 4KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.srt 4KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.srt 4KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.srt 4KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.srt 3KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.srt 3KB
- ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.srt 3KB
- ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.srt 3KB
- ~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt 3KB
- ~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.srt 2KB
- ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.srt 2KB
- ~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.srt 2KB
- ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.srt 1KB
- ~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.srt 1KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/DNSCyOps.pcapng 1KB
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 183B