搜索
[Pluralsight] Cisco CyberOps
磁力链接/BT种子名称
[Pluralsight] Cisco CyberOps
磁力链接/BT种子简介
种子哈希:
2d6cb4e3233a2ee7a40b2a1480e7744800c74710
文件大小:
1.47G
已经下载:
3289
次
下载速度:
极快
收录时间:
2022-02-06
最近下载:
2025-08-08
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:2D6CB4E3233A2EE7A40B2A1480E7744800C74710
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
哆哔涩漫
呦乐园
萝莉岛
最近搜索
hindi dubbed
熟女阿姨
onlyfans - nana
gxaz-050
波波妹苏小美
patreon+ai
妮姬
史莱姆
えむ。
阴道 特写
ssis+-+309
hez-785
roccos
熟女 自拍
patreon+
switch+-+updown
stsk
ช.ม.สวนแหลมทอง2
yeha
فيوزات+السيارات+pdf
patreon★
◆fanbox◆+
åå¦åæ
fast furious 5
2crazy14oldchickz1
megapack+-+incest
电影
kimetsu+no+yaiba-yuukaku-hen
2crazy14oldchickz
女儿
文件列表
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/smb_file_transfer.pcapng
42.0 MB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/smb_file_transfer.pcapng
42.0 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4
30.0 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.mp4
27.3 MB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4
26.7 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4
26.5 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/03. Using Wireshark for File Extraction.mp4
26.5 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/06. Examining Additional Network Data Sources.mp4
26.4 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/04. Exploring More Network Protocols.mp4
26.4 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/04. Examining More Network Data Sources.mp4
25.4 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/04. Reporting.mp4
24.7 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4
23.3 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4
23.2 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/02. Identifying Elements in a Datagram.mp4
22.7 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/05. Understanding Network Protocols.mp4
21.6 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/07. Seeing the Raw Traffic.mp4
21.4 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4
20.3 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.mp4
20.1 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/05. Comparing Raw Traffic with Netflow.mp4
19.8 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.mp4
19.7 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/03. Examining Network Data Sources.mp4
19.6 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/06. Analyzing Netflow Information.mp4
19.1 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/06. Wrapping up Network Protocols.mp4
18.9 MB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/03. Investigating Network Security Device Alerts.mp4
17.7 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/03. Exploring the Common Network Protocols.mp4
17.3 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4
16.8 MB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/02. Exploring Artifacts in Splunk.mp4
16.6 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.mp4
15.8 MB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4
15.8 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.mp4
15.6 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/01. Seeing Threats from the Network.mp4
14.9 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4
14.9 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.mp4
14.7 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4
14.3 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4
14.0 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/06. Tampering with Disk Images.mp4
13.8 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/02. Reducing Visibility Through Security.mp4
13.7 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4
13.6 MB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/Sample Logs.csv
13.4 MB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/Sample Logs.csv
13.4 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4
12.8 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/06. Directory Traversal Demo.mp4
12.6 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4
12.4 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4
11.9 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/03. The Incident Response Steps.mp4
11.7 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/02. Inspecting Packets.mp4
11.5 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4
11.2 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/01. Gathering Traffic Information.mp4
11.0 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/05. Analyzing Certificates.mp4
10.9 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4
10.7 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.mp4
10.3 MB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4
10.2 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/05. Other Network Data Sources.mp4
10.1 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4
10.0 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4
9.7 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4
9.6 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4
9.6 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4
9.5 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4
9.5 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/05. Finding the Evidence.mp4
9.3 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4
9.3 MB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4
9.2 MB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/04. Stateful Firewalls and DPI.mp4
9.0 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/01. Introducing Host-based Analysis.mp4
9.0 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/02. Learning About Data types.mp4
9.0 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4
8.8 MB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4
8.8 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4
8.6 MB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4
8.5 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/04. Network Attacks.mp4
8.5 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/05. Additional Data to Use.mp4
8.4 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4
8.1 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/02. Social Engineering.mp4
8.1 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/02. Getting Started.mp4
8.0 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4
7.9 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.mp4
7.9 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/05. Attack Demo.mp4
7.8 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4
7.8 MB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/smtp.pcapng
7.6 MB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/smtp.pcapng
7.6 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4
7.6 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4
7.6 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/04. The IR Team.mp4
7.6 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/02. Network Data Sources Syslog and Telemetry.mp4
7.4 MB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/01. Exploring Key Datagram Elements.mp4
7.4 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/03. Social Engineering Demo.mp4
7.2 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4
7.2 MB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/04. Putting It All together.mp4
7.1 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/04. Certificate Components.mp4
7.1 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/02. Investigation Terminology.mp4
7.0 MB
04. Cisco CyberOps Analyzing the Network/Exercise/03/inspecting-network-traffic-slides.pdf
6.9 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/03. Antimalware and Antivirus.mp4
6.8 MB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/05. Putting It All Together.mp4
6.7 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4
6.6 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4
6.4 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/04. Systems-based Sandboxing.mp4
6.1 MB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/08. Impacts of Positive and Negative Detections.mp4
6.0 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/01. Malware Analysis.mp4
5.9 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4
5.9 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4
5.9 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4
5.9 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.mp4
5.8 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.mp4
5.7 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4
5.6 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.mp4
5.6 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.mp4
5.5 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4
5.5 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/04. Investigation Evidence.mp4
5.3 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/05. Application Allow and Block Lists.mp4
5.3 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/03. Attack Attribution.mp4
5.3 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4
5.1 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/01. Introduction to Certificates.mp4
5.1 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4
5.1 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/01. Introduction.mp4
5.0 MB
05. Cisco CyberOps Managing Policies and Procedures/Exercise/04/applying-the-incident-response-process-slides.pdf
4.9 MB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4
4.9 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/02. Malware Analysis Tools.mp4
4.8 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/05. Web Application Attacks.mp4
4.8 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4
4.7 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/01. Course Introduction.mp4
4.5 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4
4.5 MB
04. Cisco CyberOps Analyzing the Network/Exercise/02/analyzing-network-events-and-data-slides.pdf
4.5 MB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/02. Host-based IDS and Firewalls.mp4
4.4 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/06. Lets Wrap!.mp4
4.4 MB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4
4.4 MB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/01. Examining Artifacts in Alerts.mp4
4.2 MB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/06. Collecting Evidence.mp4
4.1 MB
04. Cisco CyberOps Analyzing the Network/01. Course Overview/01. Course Overview.mp4
3.9 MB
03. Cisco CyberOps Analyzing Hosts/Exercise/02/securing-the-host-slides.pdf
3.8 MB
01. Cisco CyberOps Exploring Security Concepts/01. Course Overview/01. Course Overview.mp4
3.8 MB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/04. Interpreting Basic Regular Expressions.mp4
3.6 MB
02. Cisco CyberOps Security Monitoring/01. Course Overview/01. Course Overview.mp4
3.6 MB
02. Cisco CyberOps Security Monitoring/Exercise/05/concealing-the-attack-slides.pdf
3.6 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4
3.5 MB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4
3.4 MB
05. Cisco CyberOps Managing Policies and Procedures/Exercise/03/identifying-assets-and-critical-data-slides.pdf
3.4 MB
05. Cisco CyberOps Managing Policies and Procedures/01. Course Overview/01. Course Overview.mp4
3.3 MB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/06. Lets Wrap!.mp4
3.2 MB
03. Cisco CyberOps Analyzing Hosts/01. Course Overview/01. Course Overview.mp4
3.2 MB
02. Cisco CyberOps Security Monitoring/Exercise/03/discovering-common-attacks-slides.pdf
3.1 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/01. Introduction to Concealment.mp4
2.9 MB
02. Cisco CyberOps Security Monitoring/Exercise/04/identifying-data-types-and-uses-slides.pdf
2.8 MB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/05. Putting It All Together.mp4
2.8 MB
01. Cisco CyberOps Exploring Security Concepts/Exercise/02/defining-cybersecurity-what-is-it-anyway-slides.pdf
2.6 MB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/06. Closing It Out!.mp4
2.5 MB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4
2.4 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/01. Investigating an Attack.mp4
2.3 MB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4
2.2 MB
03. Cisco CyberOps Analyzing Hosts/Exercise/05/investigating-an-attack-slides.pdf
2.2 MB
03. Cisco CyberOps Analyzing Hosts/Exercise/04/understanding-linux-security-components-and-log-usage-slides.pdf
2.1 MB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.mp4
2.1 MB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/07. Wrapping up Investigations.mp4
2.0 MB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.mp4
1.9 MB
05. Cisco CyberOps Managing Policies and Procedures/Exercise/05/classifying-intrusion-events-slides.pdf
1.9 MB
01. Cisco CyberOps Exploring Security Concepts/Exercise/04/explaining-cybersecurity-challenges-slides.pdf
1.7 MB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/07. Module Review.mp4
1.7 MB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/07. Wrapping up Attacks.mp4
1.6 MB
02. Cisco CyberOps Security Monitoring/Exercise/06/using-certificates-for-security-slides.pdf
1.6 MB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/06. Concealment Review.mp4
1.6 MB
02. Cisco CyberOps Security Monitoring/Exercise/02/learning-about-the-attack-surface-slides.pdf
1.2 MB
05. Cisco CyberOps Managing Policies and Procedures/Exercise/02/understanding-cyber-management-concepts-slides.pdf
1.2 MB
01. Cisco CyberOps Exploring Security Concepts/Exercise/03/identifying-common-cybersecurity-concepts-slides.pdf
1.1 MB
03. Cisco CyberOps Analyzing Hosts/Exercise/03/identifying-and-interpreting-windows-components-and-logs-slides.pdf
1.1 MB
03. Cisco CyberOps Analyzing Hosts/Exercise/06/using-malware-analysis-tools-slides.pdf
1.0 MB
04. Cisco CyberOps Analyzing the Network/Exercise/04/analyzing-raw-data-slides.pdf
905.6 kB
04. Cisco CyberOps Analyzing the Network/Exercise/05/interpreting-alerts-and-event-elements-slides.pdf
869.8 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/tls.pcapng
681.5 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/tls.pcapng
681.5 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/02. Reducing Visibility Through Security.srt
11.8 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/03. Using Wireshark for File Extraction.srt
11.6 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/03. The Incident Response Steps.srt
10.7 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/05. Incident Response in the Lab.srt
10.4 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/05. Comparing Raw Traffic with Netflow.srt
10.4 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/02. Course Overview.srt
10.3 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/01. Seeing Threats from the Network.srt
9.8 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/04. Reporting.srt
9.8 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/06. Examining Additional Network Data Sources.srt
9.7 kB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.srt
9.6 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/02. Creating an Incident Response Plan.srt
9.5 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/04. Exploring More Network Protocols.srt
9.4 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.srt
9.4 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.srt
9.3 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.srt
9.3 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/05. Security Technologies.srt
9.2 kB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/03. Practicing Event Mapping.srt
9.2 kB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/02. Describing Management Concepts.srt
8.9 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.srt
8.9 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/02. Identifying Elements in a Datagram.srt
8.9 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.srt
8.8 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/01. Gathering Traffic Information.srt
8.7 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.srt
8.7 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.srt
8.4 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.srt
8.4 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/06. Analyzing Netflow Information.srt
8.4 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.srt
8.3 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/02. Getting Started.srt
8.2 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/07. Seeing the Raw Traffic.srt
8.2 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/04. Network Attacks.srt
8.2 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/06. Tampering with Disk Images.srt
8.2 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/04. Examining More Network Data Sources.srt
8.2 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/05. Understanding Network Protocols.srt
8.1 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/01. Introducing Host-based Analysis.srt
8.1 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt
8.1 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/telnet.pcapng
8.0 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/telnet.pcapng
8.0 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/03. Access Control Models.srt
7.9 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/05. Other Network Data Sources.srt
7.9 kB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/02. Mapping Events to the Models.srt
7.8 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/03. Examining Network Data Sources.srt
7.7 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/04. The IR Team.srt
7.7 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/02. Risk Management.srt
7.6 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.srt
7.6 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.srt
7.6 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.srt
7.6 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt
7.5 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/02. Certificate Functions and Terminology.srt
7.5 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.srt
7.5 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.srt
7.5 kB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.srt
7.3 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.srt
7.3 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/04. Stateful Firewalls and DPI.srt
7.3 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/02. Social Engineering.srt
7.3 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/03. Exploring the Common Network Protocols.srt
7.2 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/02. Learning About Data types.srt
7.1 kB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/01. Understanding Frameworks and Models.srt
7.0 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.srt
6.9 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.srt
6.9 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/05. Analyzing Certificates.srt
6.8 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/05. Attack Demo.srt
6.8 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.srt
6.7 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/04. Endpoint-based Attacks.srt
6.6 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/06. Directory Traversal Demo.srt
6.6 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.srt
6.4 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/02. Learning About Server Profiling.srt
6.4 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/01. Exploring Key Datagram Elements.srt
6.2 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/02. Network Data Sources Syslog and Telemetry.srt
6.2 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.srt
6.2 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.srt
6.2 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt
6.1 kB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/03. Investigating Network Security Device Alerts.srt
6.1 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.srt
6.0 kB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/02. Exploring Artifacts in Splunk.srt
5.9 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/05. Additional Data to Use.srt
5.9 kB
04. Cisco CyberOps Analyzing the Network/03. Inspecting Network Traffic/02. Inspecting Packets.srt
5.9 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.srt
5.8 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/01. Malware Analysis.srt
5.8 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/EIGRPv6.pcap
5.7 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/EIGRPv6.pcap
5.7 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/04. Certificate Components.srt
5.7 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.srt
5.7 kB
04. Cisco CyberOps Analyzing the Network/04. Analyzing Raw Data/06. Wrapping up Network Protocols.srt
5.7 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/03. Antimalware and Antivirus.srt
5.6 kB
04. Cisco CyberOps Analyzing the Network/02. Analyzing Network Events and Data/08. Impacts of Positive and Negative Detections.srt
5.6 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/01. The MITRE Attack Framework.srt
5.5 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/05. Finding the Evidence.srt
5.4 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/01. Learning About the Incident Response Process.srt
5.4 kB
05. Cisco CyberOps Managing Policies and Procedures/05. Classifying Intrusion Events/04. Putting It All together.srt
5.4 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/netflow.pcapng
5.4 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/netflow.pcapng
5.4 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt
5.4 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/02. Investigation Terminology.srt
5.3 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/04. Systems-based Sandboxing.srt
5.3 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/04. Investigation Evidence.srt
5.2 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.srt
5.2 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/03. Attack Attribution.srt
5.1 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.srt
5.1 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/pop.pcapng
5.1 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/pop.pcapng
5.1 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.srt
5.1 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt
5.0 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/01. Introduction to Certificates.srt
4.9 kB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/05. Putting It All Together.srt
4.9 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.srt
4.8 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/03. Whats the Impact of Certificates.srt
4.8 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/02. Malware Analysis Tools.srt
4.8 kB
05. Cisco CyberOps Managing Policies and Procedures/02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.srt
4.8 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/06. Learning About Network Profiling.srt
4.7 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/05. Application Allow and Block Lists.srt
4.7 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/03. Social Engineering Demo.srt
4.6 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt
4.6 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/05. Web Application Attacks.srt
4.6 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/01. Course Introduction.srt
4.5 kB
05. Cisco CyberOps Managing Policies and Procedures/03. Identifying Assets and Critical Data/09. Protecting Critical Data.srt
4.5 kB
05. Cisco CyberOps Managing Policies and Procedures/04. Applying the Incident Response Process/06. Collecting Evidence.srt
4.5 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.srt
4.4 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/08. Let's Wrap!.srt
4.4 kB
02. Cisco CyberOps Security Monitoring/06. Using Certificates for Security/06. Lets Wrap!.srt
4.1 kB
03. Cisco CyberOps Analyzing Hosts/02. Securing the Host/02. Host-based IDS and Firewalls.srt
4.0 kB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/01. Examining Artifacts in Alerts.srt
4.0 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/03. Whats an Attack Surface.srt
3.9 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/01. Introduction.srt
3.8 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/01. Introduction.srt
3.8 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.srt
3.6 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/04. Traffic Profiles.srt
3.6 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/01. Introduction to Concealment.srt
3.3 kB
04. Cisco CyberOps Analyzing the Network/05. Interpreting Alerts and Event Elements/04. Interpreting Basic Regular Expressions.srt
3.3 kB
01. Cisco CyberOps Exploring Security Concepts/04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.srt
3.2 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/05. Putting It All Together.srt
3.1 kB
02. Cisco CyberOps Security Monitoring/02. Learning About the Attack Surface/06. Closing It Out!.srt
3.0 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/01. Introducing Data Sources.srt
3.0 kB
03. Cisco CyberOps Analyzing Hosts/06. Using Malware Analysis Tools/06. Lets Wrap!.srt
2.9 kB
01. Cisco CyberOps Exploring Security Concepts/03. Identifying Common Cybersecurity Concepts/01. Introduction.srt
2.6 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/http.pcapng
2.6 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/http.pcapng
2.6 kB
01. Cisco CyberOps Exploring Security Concepts/02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.srt
2.6 kB
03. Cisco CyberOps Analyzing Hosts/04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.srt
2.5 kB
04. Cisco CyberOps Analyzing the Network/01. Course Overview/01. Course Overview.srt
2.4 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/01. Investigating an Attack.srt
2.4 kB
05. Cisco CyberOps Managing Policies and Procedures/01. Course Overview/01. Course Overview.srt
2.3 kB
03. Cisco CyberOps Analyzing Hosts/05. Investigating an Attack/07. Wrapping up Investigations.srt
2.3 kB
01. Cisco CyberOps Exploring Security Concepts/01. Course Overview/01. Course Overview.srt
2.3 kB
03. Cisco CyberOps Analyzing Hosts/01. Course Overview/01. Course Overview.srt
2.2 kB
02. Cisco CyberOps Security Monitoring/01. Course Overview/01. Course Overview.srt
2.2 kB
03. Cisco CyberOps Analyzing Hosts/03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.srt
2.1 kB
02. Cisco CyberOps Security Monitoring/03. Discovering Common Attacks/07. Wrapping up Attacks.srt
2.1 kB
02. Cisco CyberOps Security Monitoring/04. Identifying Data Types and Uses/07. Module Review.srt
2.0 kB
02. Cisco CyberOps Security Monitoring/05. Concealing the Attack/06. Concealment Review.srt
1.8 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/ICMPv6.pcap
1.3 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/ICMPv6.pcap
1.3 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/icmp.pcapng
1.1 kB
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/icmp.pcapng
1.1 kB
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/DNS.pcapng
696 Bytes
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/DNS.pcapng
696 Bytes
04. Cisco CyberOps Analyzing the Network/Exercise/01/demos/Course Materials/arp.pcapng
656 Bytes
04. Cisco CyberOps Analyzing the Network/Exercise/Course Materials/arp.pcapng
656 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!