Cisco CyberOps Associate (200-201)
File List
- Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.mp4 131.3 MB
- Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.mp4 118.9 MB
- Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.mp4 118.3 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.mp4 113.9 MB
- Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.mp4 110.7 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.mp4 108.7 MB
- Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.mp4 106.5 MB
- Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.mp4 106.1 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.mp4 105.8 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.mp4 104.9 MB
- Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.mp4 100.9 MB
- Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.mp4 100.4 MB
- Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.mp4 97.3 MB
- Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.mp4 97.1 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.mp4 97.1 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.mp4 95.0 MB
- Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.mp4 92.3 MB
- Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.mp4 92.1 MB
- Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.mp4 91.1 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.mp4 90.3 MB
- Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.mp4 89.4 MB
- Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.mp4 88.8 MB
- Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.mp4 88.6 MB
- Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.mp4 87.6 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.mp4 86.9 MB
- Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.mp4 86.4 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.mp4 85.6 MB
- Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.mp4 85.6 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.mp4 85.5 MB
- Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.mp4 85.4 MB
- Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.mp4 83.6 MB
- Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.mp4 83.5 MB
- Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.mp4 82.8 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.mp4 82.7 MB
- Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.mp4 82.1 MB
- Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.mp4 78.9 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.mp4 78.6 MB
- Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.mp4 77.8 MB
- Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.mp4 77.3 MB
- Chapter 1 Cybersecurity Operations Essentials/001. Overview.mp4 77.1 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.mp4 75.7 MB
- Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.mp4 75.1 MB
- Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.mp4 71.9 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.mp4 70.2 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.mp4 63.0 MB
- Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.mp4 61.6 MB
- Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.mp4 58.8 MB
- Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.mp4 53.1 MB
- Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.en.srt 35.5 KB
- Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.en.srt 34.3 KB
- Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.en.srt 33.4 KB
- Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.en.srt 33.3 KB
- Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.en.srt 32.7 KB
- Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.en.srt 32.7 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.en.srt 32.6 KB
- Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.en.srt 32.0 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.en.srt 31.3 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.en.srt 31.2 KB
- Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.en.srt 31.2 KB
- Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.en.srt 30.5 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.en.srt 30.1 KB
- Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.en.srt 30.0 KB
- Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.en.srt 29.9 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.en.srt 29.7 KB
- Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.en.srt 29.4 KB
- Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.en.srt 29.2 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.en.srt 29.1 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.en.srt 29.0 KB
- Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.en.srt 29.0 KB
- Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.en.srt 28.8 KB
- Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.en.srt 28.7 KB
- Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.en.srt 28.2 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.en.srt 28.0 KB
- Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.en.srt 27.5 KB
- Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.en.srt 27.3 KB
- Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.en.srt 27.3 KB
- Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.en.srt 27.1 KB
- Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.en.srt 25.7 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.en.srt 25.6 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.en.srt 25.5 KB
- Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.en.srt 25.0 KB
- Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.en.srt 25.0 KB
- Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.en.srt 24.7 KB
- Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.en.srt 24.0 KB
- Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.en.srt 23.9 KB
- Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.en.srt 23.7 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.en.srt 23.7 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.en.srt 23.4 KB
- Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.en.srt 20.3 KB
- Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.en.srt 20.3 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.en.srt 19.9 KB
- Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.en.srt 18.9 KB
- Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.en.srt 18.7 KB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.en.srt 17.4 KB
- Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.en.srt 15.0 KB
- Chapter 1 Cybersecurity Operations Essentials/001. Overview.en.srt 13.4 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.