[ ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 4 Network Intrusion Analysis
- 收录时间:2021-11-29 11:34:34
- 文件大小:459MB
- 下载次数:1
- 最近下载:2021-11-29 11:34:34
- 磁力链接:
-
文件列表
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[1] Understanding TCP.mp4 27MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[2] Moving through the TCP handshake and teardown.mp4 26MB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[1] Being application aware.mp4 23MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[3] Recognizing User Datagram Protocol.mp4 21MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[5] Extracting objects from a pcap.mp4 20MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[1] Analyzing HTTP.mp4 18MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[2] Dissecting DNS.mp4 18MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[5] Detecting malware by examining artifacts.mp4 18MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[7] Discovering ICMPv6.mp4 17MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[5] Interpreting IDSIPS alerts.mp4 16MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[6] Grasping ICMP.mp4 16MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[6] Confirming malware by examining artifacts.mp4 16MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[4] Monitoring traffic.mp4 15MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[4] Identifying key elements from a pcap.mp4 15MB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[2] Evaluating antivirus alerts.mp4 14MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[4] Viewing IPv4.mp4 14MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[1] Comparing methods to examine traffic.mp4 12MB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[3] Viewing web proxy logs.mp4 12MB
- ~Get Your Files Here !/[1] Introduction/[1] Evaluating intrusion alerts.mp4 12MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[3] Using ARP.mp4 11MB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[5] Investigating IPv6.mp4 11MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[7] Solution Log file analysis.mp4 11MB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[5] Solution Regular expressions.mp4 11MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[1] Understanding the OSI model.mp4 9MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[7] Solution Install the CyberOps workstation.mp4 9MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[6] Challenge Install the CyberOps workstation.mp4 9MB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[4] Outlining email threats.mp4 9MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[3] Recognizing alerts and events.mp4 8MB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[2] Comparing IPS and IDS.mp4 8MB
- ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.mp4 8MB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[4] Challenge Regular expressions.mp4 6MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[2] Tapping into the network.mp4 5MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[6] Challenge Log file analysis.mp4 5MB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[3] Creating an Ethernet frame.mp4 4MB
- ~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4 4MB
- ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.mp4 3MB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 01/Challenge Install the CyberOps WS.pdf 126KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 02/Challenge RegEx Tutorial.pdf 99KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 00/CyOps 04-Links.pdf 84KB
- ~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 03/Challenge Log File Analysis.pdf 33KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[1] Understanding TCP.srt 12KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[2] Moving through the TCP handshake and teardown.srt 11KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[5] Extracting objects from a pcap.srt 9KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[6] Grasping ICMP.srt 8KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[3] Recognizing User Datagram Protocol.srt 8KB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[1] Being application aware.srt 8KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[7] Solution Log file analysis.srt 7KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[4] Viewing IPv4.srt 7KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[1] Understanding the OSI model.srt 7KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[5] Detecting malware by examining artifacts.srt 6KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[4] Monitoring traffic.srt 6KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[7] Discovering ICMPv6.srt 6KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[2] Dissecting DNS.srt 6KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[5] Interpreting IDSIPS alerts.srt 6KB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[3] Viewing web proxy logs.srt 6KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[4] Identifying key elements from a pcap.srt 6KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[6] Confirming malware by examining artifacts.srt 6KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[1] Analyzing HTTP.srt 6KB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[2] Evaluating antivirus alerts.srt 6KB
- ~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[5] Investigating IPv6.srt 5KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[1] Comparing methods to examine traffic.srt 5KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[3] Using ARP.srt 5KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[3] Creating an Ethernet frame.srt 5KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[6] Challenge Install the CyberOps workstation.srt 4KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[2] Comparing IPS and IDS.srt 4KB
- ~Get Your Files Here !/[6] 5. Visualizing Application Data/[4] Outlining email threats.srt 4KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[3] Recognizing alerts and events.srt 4KB
- ~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.srt 4KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[2] Tapping into the network.srt 3KB
- ~Get Your Files Here !/[2] 1. Working with Network Security Data/[7] Solution Install the CyberOps workstation.srt 3KB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[5] Solution Regular expressions.srt 2KB
- ~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[4] Challenge Regular expressions.srt 2KB
- ~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt 2KB
- ~Get Your Files Here !/[1] Introduction/[1] Evaluating intrusion alerts.srt 2KB
- ~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[6] Challenge Log file analysis.srt 2KB
- ~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.srt 1KB
- ~Get Your Files Here !/Bonus Resources.txt 357B
- Get Bonus Downloads Here.url 177B