05. Cisco CyberOps Managing Policies and Procedures
File List
- 04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4 28.7 MB
- 05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4 25.5 MB
- 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4 22.2 MB
- 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4 19.3 MB
- 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4 15.1 MB
- 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4 13.6 MB
- 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4 13.0 MB
- 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4 11.8 MB
- 04. Applying the Incident Response Process/03. The Incident Response Steps.mp4 11.1 MB
- 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4 9.7 MB
- Exercise.zip 9.6 MB
- 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4 9.2 MB
- 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4 9.1 MB
- 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4 8.8 MB
- 05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4 8.4 MB
- 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4 8.1 MB
- 04. Applying the Incident Response Process/04. The IR Team.mp4 7.2 MB
- 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4 6.8 MB
- 05. Classifying Intrusion Events/04. Putting It All together.mp4 6.8 MB
- 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4 6.1 MB
- 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4 5.6 MB
- 03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4 4.7 MB
- 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4 4.2 MB
- 04. Applying the Incident Response Process/06. Collecting Evidence.mp4 3.9 MB
- 01. Course Overview/01. Course Overview.mp4 3.2 MB
- 04. Applying the Incident Response Process/03. The Incident Response Steps.srt 10.4 KB
- 04. Applying the Incident Response Process/05. Incident Response in the Lab.srt 10.2 KB
- 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.srt 9.4 KB
- 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.srt 9.3 KB
- 05. Classifying Intrusion Events/03. Practicing Event Mapping.srt 8.9 KB
- 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.srt 8.7 KB
- 05. Classifying Intrusion Events/02. Mapping Events to the Models.srt 7.6 KB
- 04. Applying the Incident Response Process/04. The IR Team.srt 7.5 KB
- 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.srt 7.4 KB
- 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.srt 7.4 KB
- 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.srt 7.3 KB
- 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.srt 7.2 KB
- 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.srt 7.2 KB
- 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.srt 6.9 KB
- 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.srt 6.5 KB
- 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.srt 6.2 KB
- 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.srt 6.1 KB
- 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.srt 5.3 KB
- 05. Classifying Intrusion Events/04. Putting It All together.srt 5.3 KB
- 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.srt 4.7 KB
- 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.srt 4.6 KB
- 03. Identifying Assets and Critical Data/09. Protecting Critical Data.srt 4.4 KB
- 04. Applying the Incident Response Process/06. Collecting Evidence.srt 4.4 KB
- 01. Course Overview/01. Course Overview.srt 2.3 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.