02. Cisco CyberOps Security Monitoring
File List
- 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4 25.3 MB
- 04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4 16.0 MB
- 05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4 14.2 MB
- 04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4 13.4 MB
- 05. Concealing the Attack/02. Reducing Visibility Through Security.mp4 13.1 MB
- 03. Discovering Common Attacks/06. Directory Traversal Demo.mp4 12.0 MB
- 06. Using Certificates for Security/05. Analyzing Certificates.mp4 10.4 MB
- Exercise.zip 10.3 MB
- 04. Identifying Data Types and Uses/02. Learning About Data types.mp4 8.5 MB
- 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4 8.4 MB
- 02. Learning About the Attack Surface/04. Network Attacks.mp4 8.1 MB
- 04. Identifying Data Types and Uses/05. Additional Data to Use.mp4 8.0 MB
- 02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4 7.8 MB
- 03. Discovering Common Attacks/02. Social Engineering.mp4 7.7 MB
- 02. Learning About the Attack Surface/02. Getting Started.mp4 7.7 MB
- 02. Learning About the Attack Surface/05. Attack Demo.mp4 7.5 MB
- 03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4 7.4 MB
- 06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4 7.2 MB
- 03. Discovering Common Attacks/03. Social Engineering Demo.mp4 6.9 MB
- 06. Using Certificates for Security/04. Certificate Components.mp4 6.7 MB
- 03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4 5.6 MB
- 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4 5.6 MB
- 04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4 4.9 MB
- 06. Using Certificates for Security/01. Introduction to Certificates.mp4 4.9 MB
- 06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4 4.8 MB
- 03. Discovering Common Attacks/05. Web Application Attacks.mp4 4.6 MB
- 02. Learning About the Attack Surface/01. Course Introduction.mp4 4.3 MB
- 01. Course Overview/01. Course Overview.mp4 3.5 MB
- 06. Using Certificates for Security/06. Lets Wrap!.mp4 3.1 MB
- 05. Concealing the Attack/01. Introduction to Concealment.mp4 2.7 MB
- 02. Learning About the Attack Surface/06. Closing It Out!.mp4 2.4 MB
- 04. Identifying Data Types and Uses/07. Module Review.mp4 1.6 MB
- 03. Discovering Common Attacks/07. Wrapping up Attacks.mp4 1.5 MB
- 05. Concealing the Attack/06. Concealment Review.mp4 1.5 MB
- 05. Concealing the Attack/02. Reducing Visibility Through Security.srt 11.6 KB
- 02. Learning About the Attack Surface/02. Getting Started.srt 8.0 KB
- 02. Learning About the Attack Surface/04. Network Attacks.srt 8.0 KB
- 05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt 7.9 KB
- 05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt 7.4 KB
- 06. Using Certificates for Security/02. Certificate Functions and Terminology.srt 7.3 KB
- 03. Discovering Common Attacks/02. Social Engineering.srt 7.1 KB
- 04. Identifying Data Types and Uses/02. Learning About Data types.srt 7.0 KB
- 06. Using Certificates for Security/05. Analyzing Certificates.srt 6.7 KB
- 02. Learning About the Attack Surface/05. Attack Demo.srt 6.6 KB
- 03. Discovering Common Attacks/04. Endpoint-based Attacks.srt 6.5 KB
- 03. Discovering Common Attacks/06. Directory Traversal Demo.srt 6.4 KB
- 04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt 6.0 KB
- 04. Identifying Data Types and Uses/05. Additional Data to Use.srt 5.8 KB
- 06. Using Certificates for Security/04. Certificate Components.srt 5.6 KB
- 03. Discovering Common Attacks/01. The MITRE Attack Framework.srt 5.3 KB
- 04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt 5.3 KB
- 04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt 4.8 KB
- 06. Using Certificates for Security/01. Introduction to Certificates.srt 4.8 KB
- 06. Using Certificates for Security/03. Whats the Impact of Certificates.srt 4.7 KB
- 03. Discovering Common Attacks/03. Social Engineering Demo.srt 4.5 KB
- 05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt 4.5 KB
- 03. Discovering Common Attacks/05. Web Application Attacks.srt 4.4 KB
- 02. Learning About the Attack Surface/01. Course Introduction.srt 4.4 KB
- 06. Using Certificates for Security/06. Lets Wrap!.srt 4.0 KB
- 02. Learning About the Attack Surface/03. Whats an Attack Surface.srt 3.8 KB
- 05. Concealing the Attack/01. Introduction to Concealment.srt 3.2 KB
- 02. Learning About the Attack Surface/06. Closing It Out!.srt 2.9 KB
- 04. Identifying Data Types and Uses/01. Introducing Data Sources.srt 2.9 KB
- 01. Course Overview/01. Course Overview.srt 2.1 KB
- 03. Discovering Common Attacks/07. Wrapping up Attacks.srt 2.0 KB
- 04. Identifying Data Types and Uses/07. Module Review.srt 1.9 KB
- 05. Concealing the Attack/06. Concealment Review.srt 1.8 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.