589689.xyz

[ ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 2 Security Monitoring

  • 收录时间:2022-02-10 23:04:39
  • 文件大小:481MB
  • 下载次数:1
  • 最近下载:2022-02-10 23:04:39
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.mp4 27MB
  2. ~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.mp4 26MB
  3. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.mp4 20MB
  4. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.mp4 19MB
  5. ~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.mp4 19MB
  6. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.mp4 16MB
  7. ~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.mp4 16MB
  8. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.mp4 16MB
  9. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.mp4 15MB
  10. ~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.mp4 15MB
  11. ~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.mp4 15MB
  12. ~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.mp4 14MB
  13. ~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.mp4 14MB
  14. ~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.mp4 13MB
  15. ~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.mp4 13MB
  16. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.mp4 12MB
  17. ~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.mp4 12MB
  18. ~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.mp4 12MB
  19. ~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.mp4 11MB
  20. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.mp4 11MB
  21. ~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.mp4 11MB
  22. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.mp4 11MB
  23. ~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.mp4 11MB
  24. ~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.mp4 10MB
  25. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.mp4 10MB
  26. ~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.mp4 10MB
  27. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.mp4 9MB
  28. ~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.mp4 8MB
  29. ~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.mp4 8MB
  30. ~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.mp4 7MB
  31. ~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).mp4 7MB
  32. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.mp4 7MB
  33. ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.mp4 7MB
  34. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.mp4 7MB
  35. ~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.mp4 6MB
  36. ~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.mp4 6MB
  37. ~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.mp4 6MB
  38. ~Get Your Files Here !/[1] Introduction/[1] Active security monitoring.mp4 6MB
  39. ~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4 5MB
  40. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.mp4 4MB
  41. ~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.mp4 4MB
  42. ~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.mp4 3MB
  43. ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.mp4 3MB
  44. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 02/CyOps 02 Netflow Demo.pka 639KB
  45. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 04/BONUS_PTActA_ACL.pka 290KB
  46. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 00/CyOps 02-Links.pdf 89KB
  47. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 01/Challenge Social Engineering.pdf 30KB
  48. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/Challenge Wireshark and DNS.pdf 29KB
  49. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.srt 9KB
  50. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.srt 9KB
  51. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.srt 9KB
  52. ~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.srt 8KB
  53. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.srt 8KB
  54. ~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.srt 8KB
  55. ~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.srt 8KB
  56. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.srt 7KB
  57. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.srt 7KB
  58. ~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.srt 7KB
  59. ~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.srt 7KB
  60. ~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.srt 7KB
  61. ~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.srt 6KB
  62. ~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.srt 6KB
  63. ~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.srt 6KB
  64. ~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.srt 6KB
  65. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.srt 6KB
  66. ~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.srt 6KB
  67. ~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.srt 6KB
  68. ~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.srt 6KB
  69. ~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.srt 6KB
  70. ~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.srt 5KB
  71. ~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.srt 5KB
  72. ~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.srt 5KB
  73. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.srt 4KB
  74. ~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.srt 4KB
  75. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.srt 4KB
  76. ~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.srt 4KB
  77. ~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).srt 4KB
  78. ~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.srt 4KB
  79. ~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.srt 4KB
  80. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.srt 4KB
  81. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.srt 3KB
  82. ~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.srt 3KB
  83. ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.srt 3KB
  84. ~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.srt 3KB
  85. ~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt 3KB
  86. ~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.srt 2KB
  87. ~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.srt 2KB
  88. ~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.srt 2KB
  89. ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.srt 1KB
  90. ~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.srt 1KB
  91. ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/DNSCyOps.pcapng 1KB
  92. ~Get Your Files Here !/Bonus Resources.txt 357B
  93. Get Bonus Downloads Here.url 183B