03. Cisco CyberOps Analyzing Hosts
File List
- 04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.mp4 26.0 MB
- 06. Using Malware Analysis Tools/04. Reporting.mp4 23.6 MB
- 04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.mp4 19.2 MB
- 02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.mp4 18.8 MB
- 03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.mp4 15.1 MB
- 04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.mp4 14.9 MB
- 03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.mp4 14.0 MB
- 05. Investigating an Attack/06. Tampering with Disk Images.mp4 13.1 MB
- 06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.mp4 9.8 MB
- 05. Investigating an Attack/05. Finding the Evidence.mp4 8.9 MB
- 02. Securing the Host/01. Introducing Host-based Analysis.mp4 8.6 MB
- Exercise.zip 8.1 MB
- 04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.mp4 7.5 MB
- 05. Investigating an Attack/02. Investigation Terminology.mp4 6.7 MB
- 02. Securing the Host/03. Antimalware and Antivirus.mp4 6.5 MB
- 02. Securing the Host/04. Systems-based Sandboxing.mp4 5.9 MB
- 06. Using Malware Analysis Tools/01. Malware Analysis.mp4 5.6 MB
- 03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.mp4 5.5 MB
- 04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.mp4 5.4 MB
- 03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.mp4 5.3 MB
- 03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.mp4 5.3 MB
- 05. Investigating an Attack/04. Investigation Evidence.mp4 5.1 MB
- 02. Securing the Host/05. Application Allow and Block Lists.mp4 5.1 MB
- 05. Investigating an Attack/03. Attack Attribution.mp4 5.0 MB
- 06. Using Malware Analysis Tools/02. Malware Analysis Tools.mp4 4.6 MB
- 02. Securing the Host/02. Host-based IDS and Firewalls.mp4 4.2 MB
- 06. Using Malware Analysis Tools/06. Lets Wrap!.mp4 4.2 MB
- 01. Course Overview/01. Course Overview.mp4 3.1 MB
- 06. Using Malware Analysis Tools/05. Putting It All Together.mp4 2.7 MB
- 05. Investigating an Attack/01. Investigating an Attack.mp4 2.2 MB
- 04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.mp4 2.0 MB
- 05. Investigating an Attack/07. Wrapping up Investigations.mp4 1.9 MB
- 03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.mp4 1.8 MB
- 06. Using Malware Analysis Tools/04. Reporting.srt 9.5 KB
- 03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.srt 9.2 KB
- 04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.srt 9.0 KB
- 02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.srt 8.7 KB
- 04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.srt 8.5 KB
- 05. Investigating an Attack/06. Tampering with Disk Images.srt 8.0 KB
- 02. Securing the Host/01. Introducing Host-based Analysis.srt 7.9 KB
- 03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.srt 7.3 KB
- 04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.srt 6.8 KB
- 04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.srt 6.3 KB
- 06. Using Malware Analysis Tools/01. Malware Analysis.srt 5.6 KB
- 03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.srt 5.5 KB
- 02. Securing the Host/03. Antimalware and Antivirus.srt 5.5 KB
- 05. Investigating an Attack/05. Finding the Evidence.srt 5.3 KB
- 05. Investigating an Attack/02. Investigation Terminology.srt 5.2 KB
- 02. Securing the Host/04. Systems-based Sandboxing.srt 5.1 KB
- 05. Investigating an Attack/04. Investigation Evidence.srt 5.1 KB
- 03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.srt 5.1 KB
- 05. Investigating an Attack/03. Attack Attribution.srt 5.0 KB
- 04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.srt 4.9 KB
- 06. Using Malware Analysis Tools/02. Malware Analysis Tools.srt 4.7 KB
- 02. Securing the Host/05. Application Allow and Block Lists.srt 4.6 KB
- 06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.srt 4.3 KB
- 02. Securing the Host/02. Host-based IDS and Firewalls.srt 3.9 KB
- 03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.srt 3.5 KB
- 06. Using Malware Analysis Tools/05. Putting It All Together.srt 3.0 KB
- 06. Using Malware Analysis Tools/06. Lets Wrap!.srt 2.8 KB
- 04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.srt 2.4 KB
- 05. Investigating an Attack/01. Investigating an Attack.srt 2.3 KB
- 05. Investigating an Attack/07. Wrapping up Investigations.srt 2.3 KB
- 01. Course Overview/01. Course Overview.srt 2.2 KB
- 03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.srt 2.1 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.