01. Cisco CyberOps Exploring Security Concepts
File List
- 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22.1 MB
- 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12.2 MB
- 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11.4 MB
- 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 10.7 MB
- 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10.2 MB
- 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 9.6 MB
- 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9.2 MB
- 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9.1 MB
- 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9.1 MB
- 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 8.9 MB
- 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8.2 MB
- 03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 7.5 MB
- 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7.2 MB
- 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6.3 MB
- 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5.4 MB
- 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5.3 MB
- 04. Explaining Cybersecurity Challenges/01. Introduction.mp4 4.7 MB
- Exercise.zip 4.7 MB
- 02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4.5 MB
- 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4.3 MB
- 01. Course Overview/01. Course Overview.mp4 3.6 MB
- 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3.3 MB
- 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3.2 MB
- 03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2.3 MB
- 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2.1 MB
- 02. Defining Cybersecurity What Is It Anyway/02. Course Overview.srt 10.0 KB
- 02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.srt 9.1 KB
- 03. Identifying Common Cybersecurity Concepts/05. Security Technologies.srt 9.0 KB
- 02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.srt 8.6 KB
- 02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.srt 8.2 KB
- 04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.srt 8.2 KB
- 03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.srt 8.1 KB
- 03. Identifying Common Cybersecurity Concepts/03. Access Control Models.srt 7.7 KB
- 03. Identifying Common Cybersecurity Concepts/02. Risk Management.srt 7.5 KB
- 04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.srt 7.4 KB
- 03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.srt 6.8 KB
- 04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.srt 6.0 KB
- 04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.srt 5.9 KB
- 02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.srt 5.7 KB
- 02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.srt 5.0 KB
- 03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.srt 4.7 KB
- 04. Explaining Cybersecurity Challenges/08. Let's Wrap!.srt 4.3 KB
- 02. Defining Cybersecurity What Is It Anyway/01. Introduction.srt 3.7 KB
- 04. Explaining Cybersecurity Challenges/01. Introduction.srt 3.7 KB
- 04. Explaining Cybersecurity Challenges/04. Traffic Profiles.srt 3.5 KB
- 04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.srt 3.2 KB
- 03. Identifying Common Cybersecurity Concepts/01. Introduction.srt 2.6 KB
- 02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.srt 2.5 KB
- 01. Course Overview/01. Course Overview.srt 2.2 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.