资源详情

返回首页 | 相关搜索
CCST Cybersecurity Video Training Series (2025)
大小 1.73 GB
文件数 177
Info Hash: E90B82198D8B84883CFB7D12630CBEF2EB1112E7
收录时间 2026-01-02 21:46:51
更新时间 2026-01-02 21:46:51
文件列表 (177)
z.9781806023776_Code/13.1 Course Slides Download - CCST Cybersecurity.pdf
413.05 MB
Chapter 01 Welcome to the Course!/001. Welcome to the Course!.mp4
13.45 MB
Chapter 01 Welcome to the Course!/002. Meet Your Instructor.en.srt
1.38 KB
Chapter 01 Welcome to the Course!/002. Meet Your Instructor.mp4
3.89 MB
Chapter 02 Cybersecurity Essentials and Core Concepts/001. Module 1 - Cybersecurity Essentials and Core Concepts.en.srt
982 B
Chapter 02 Cybersecurity Essentials and Core Concepts/001. Module 1 - Cybersecurity Essentials and Core Concepts.mp4
2.6 MB
Chapter 02 Cybersecurity Essentials and Core Concepts/002. Cybersecurity Defined.en.srt
6.23 KB
Chapter 02 Cybersecurity Essentials and Core Concepts/002. Cybersecurity Defined.mp4
18.2 MB
Chapter 02 Cybersecurity Essentials and Core Concepts/003. The CIA Triad.en.srt
6.52 KB
Chapter 02 Cybersecurity Essentials and Core Concepts/003. The CIA Triad.mp4
13.02 MB
Chapter 02 Cybersecurity Essentials and Core Concepts/004. Vulnerabilities Threats Exploits and Risks.en.srt
3.78 KB
Chapter 02 Cybersecurity Essentials and Core Concepts/004. Vulnerabilities Threats Exploits and Risks.mp4
7.35 MB
Chapter 02 Cybersecurity Essentials and Core Concepts/005. Attack Vectors.en.srt
13.42 KB
Chapter 02 Cybersecurity Essentials and Core Concepts/005. Attack Vectors.mp4
27.39 MB
Chapter 03 Threat Landscape and Attack Motives/001. Module 2 - Threat Landscape and Attack Motives.en.srt
802 B
Chapter 03 Threat Landscape and Attack Motives/001. Module 2 - Threat Landscape and Attack Motives.mp4
2.56 MB
Chapter 03 Threat Landscape and Attack Motives/002. Categories of Attackers.en.srt
4.33 KB
Chapter 03 Threat Landscape and Attack Motives/002. Categories of Attackers.mp4
6.46 MB
Chapter 03 Threat Landscape and Attack Motives/003. Motivation for Attacks.en.srt
3.15 KB
Chapter 03 Threat Landscape and Attack Motives/003. Motivation for Attacks.mp4
5.63 MB
Chapter 03 Threat Landscape and Attack Motives/004. Malware.en.srt
7.05 KB
Chapter 03 Threat Landscape and Attack Motives/004. Malware.mp4
12.39 MB
Chapter 03 Threat Landscape and Attack Motives/005. Social Engineering Attacks.en.srt
13.14 KB
Chapter 03 Threat Landscape and Attack Motives/005. Social Engineering Attacks.mp4
27.76 MB
Chapter 03 Threat Landscape and Attack Motives/006. Physical Attacks.en.srt
5.28 KB
Chapter 03 Threat Landscape and Attack Motives/006. Physical Attacks.mp4
13.01 MB
Chapter 03 Threat Landscape and Attack Motives/007. Denial of Service DoS Attacks.en.srt
8.81 KB
Chapter 03 Threat Landscape and Attack Motives/007. Denial of Service DoS Attacks.mp4
15.15 MB
Chapter 03 Threat Landscape and Attack Motives/008. Man-in-the-Middle Attacks.en.srt
15.71 KB
Chapter 03 Threat Landscape and Attack Motives/008. Man-in-the-Middle Attacks.mp4
30.59 MB
Chapter 03 Threat Landscape and Attack Motives/009. Internet of Things IoT Weaknesses.en.srt
5.87 KB
Chapter 03 Threat Landscape and Attack Motives/009. Internet of Things IoT Weaknesses.mp4
12.93 MB
Chapter 03 Threat Landscape and Attack Motives/010. Bring Your Own Device BYOD Considerations.en.srt
7.49 KB
Chapter 03 Threat Landscape and Attack Motives/010. Bring Your Own Device BYOD Considerations.mp4
12.82 MB
Chapter 03 Threat Landscape and Attack Motives/011. Advanced Persistent Threat APT.en.srt
4.6 KB
Chapter 03 Threat Landscape and Attack Motives/011. Advanced Persistent Threat APT.mp4
8.29 MB
Chapter 04 Strengthening Your Security Posture/001. Module 3 - Strengthening Your Security Posture.en.srt
820 B
Chapter 04 Strengthening Your Security Posture/001. Module 3 - Strengthening Your Security Posture.mp4
2.21 MB
Chapter 04 Strengthening Your Security Posture/002. Defense-in-Depth.en.srt
15.35 KB
Chapter 04 Strengthening Your Security Posture/002. Defense-in-Depth.mp4
29.97 MB
Chapter 04 Strengthening Your Security Posture/003. System Hardening.en.srt
5.9 KB
Chapter 04 Strengthening Your Security Posture/003. System Hardening.mp4
14.98 MB
Chapter 04 Strengthening Your Security Posture/004. Multi-Factor Authentication.en.srt
3.5 KB
Chapter 04 Strengthening Your Security Posture/004. Multi-Factor Authentication.mp4
5.28 MB
Chapter 04 Strengthening Your Security Posture/005. Password Policies and Alternatives.en.srt
6.47 KB
Chapter 04 Strengthening Your Security Posture/005. Password Policies and Alternatives.mp4
13.27 MB
Chapter 04 Strengthening Your Security Posture/006. Authentication Authorization and Accounting AAA.en.srt
6.61 KB
Chapter 04 Strengthening Your Security Posture/006. Authentication Authorization and Accounting AAA.mp4
10.47 MB
Chapter 04 Strengthening Your Security Posture/007. Encryption.en.srt
15 KB
Chapter 04 Strengthening Your Security Posture/007. Encryption.mp4
30.91 MB
Chapter 04 Strengthening Your Security Posture/008. Protocols Supporting Encryption.en.srt
7.57 KB
Chapter 04 Strengthening Your Security Posture/008. Protocols Supporting Encryption.mp4
15.7 MB
Chapter 04 Strengthening Your Security Posture/009. Code of Ethics.en.srt
5.28 KB
Chapter 04 Strengthening Your Security Posture/009. Code of Ethics.mp4
9.66 MB
Chapter 05 Network Foundations and Security Fundamentals/001. Module 4 - Network Foundations and Security Fundamentals.en.srt
990 B
Chapter 05 Network Foundations and Security Fundamentals/001. Module 4 - Network Foundations and Security Fundamentals.mp4
2.46 MB
Chapter 05 Network Foundations and Security Fundamentals/002. TCP-IP Protocol Weaknesses.en.srt
17.06 KB
Chapter 05 Network Foundations and Security Fundamentals/002. TCP-IP Protocol Weaknesses.mp4
49.93 MB
Chapter 05 Network Foundations and Security Fundamentals/003. MAC Address Security Considerations.en.srt
6.89 KB
Chapter 05 Network Foundations and Security Fundamentals/003. MAC Address Security Considerations.mp4
12.39 MB
Chapter 05 Network Foundations and Security Fundamentals/004. IPv4 and IPv6 Addresses Security Considerations.en.srt
16.74 KB
Chapter 05 Network Foundations and Security Fundamentals/004. IPv4 and IPv6 Addresses Security Considerations.mp4
34.78 MB
Chapter 05 Network Foundations and Security Fundamentals/005. Security Appliances.en.srt
12.29 KB
Chapter 05 Network Foundations and Security Fundamentals/005. Security Appliances.mp4
19.83 MB
Chapter 05 Network Foundations and Security Fundamentals/006. Cloud Security Considerations.en.srt
7.3 KB
Chapter 05 Network Foundations and Security Fundamentals/006. Cloud Security Considerations.mp4
15.84 MB
Chapter 05 Network Foundations and Security Fundamentals/007. Proxy Servers.en.srt
5.29 KB
Chapter 05 Network Foundations and Security Fundamentals/007. Proxy Servers.mp4
10.62 MB
Chapter 05 Network Foundations and Security Fundamentals/008. Honeypots and Honeynets.en.srt
1.91 KB
Chapter 05 Network Foundations and Security Fundamentals/008. Honeypots and Honeynets.mp4
3.85 MB
Chapter 06 Controlling Access and Protecting the Network Edge/001. Module 5 - Controlling Access and Protecting the Network Edge.en.srt
978 B
Chapter 06 Controlling Access and Protecting the Network Edge/001. Module 5 - Controlling Access and Protecting the Network Edge.mp4
2.68 MB
Chapter 06 Controlling Access and Protecting the Network Edge/002. Access Control List ACL Overview.en.srt
7.33 KB
Chapter 06 Controlling Access and Protecting the Network Edge/002. Access Control List ACL Overview.mp4
13.2 MB
Chapter 06 Controlling Access and Protecting the Network Edge/003. Numbered Standard ACLs.en.srt
11.88 KB
Chapter 06 Controlling Access and Protecting the Network Edge/003. Numbered Standard ACLs.mp4
24.18 MB
Chapter 06 Controlling Access and Protecting the Network Edge/004. Numbered Extended ACLs.en.srt
15.7 KB
Chapter 06 Controlling Access and Protecting the Network Edge/004. Numbered Extended ACLs.mp4
31.97 MB
Chapter 06 Controlling Access and Protecting the Network Edge/005. Named ACLs.en.srt
20.48 KB
Chapter 06 Controlling Access and Protecting the Network Edge/005. Named ACLs.mp4
43.65 MB
Chapter 06 Controlling Access and Protecting the Network Edge/006. ACL Considerations.en.srt
14.22 KB
Chapter 06 Controlling Access and Protecting the Network Edge/006. ACL Considerations.mp4
29.12 MB
Chapter 06 Controlling Access and Protecting the Network Edge/007. Virtual Private Networks VPNs.en.srt
16.02 KB
Chapter 06 Controlling Access and Protecting the Network Edge/007. Virtual Private Networks VPNs.mp4
27.89 MB
Chapter 06 Controlling Access and Protecting the Network Edge/008. Network Access Control NAC.en.srt
12.69 KB
Chapter 06 Controlling Access and Protecting the Network Edge/008. Network Access Control NAC.mp4
23.88 MB
Chapter 06 Controlling Access and Protecting the Network Edge/009. Securing a Small Office-Home Office SOHO Wireless LAN.en.srt
18.19 KB
Chapter 06 Controlling Access and Protecting the Network Edge/009. Securing a Small Office-Home Office SOHO Wireless LAN.mp4
36.84 MB
Chapter 07 Operating System Security and Network Tools/001. Module 6 - Operating System Security and Network Tools.en.srt
2.73 KB
Chapter 07 Operating System Security and Network Tools/001. Module 6 - Operating System Security and Network Tools.mp4
10.71 MB
Chapter 07 Operating System Security and Network Tools/002. Microsoft Windows Security Considerations.en.srt
12.01 KB
Chapter 07 Operating System Security and Network Tools/002. Microsoft Windows Security Considerations.mp4
35.15 MB
Chapter 07 Operating System Security and Network Tools/003. macOS Security Considerations.en.srt
16.06 KB
Chapter 07 Operating System Security and Network Tools/003. macOS Security Considerations.mp4
30.01 MB
Chapter 07 Operating System Security and Network Tools/004. Linux Security Considerations.en.srt
12.97 KB
Chapter 07 Operating System Security and Network Tools/004. Linux Security Considerations.mp4
30.44 MB
Chapter 07 Operating System Security and Network Tools/005. netstat Utility.en.srt
7.24 KB
Chapter 07 Operating System Security and Network Tools/005. netstat Utility.mp4
19.5 MB
Chapter 07 Operating System Security and Network Tools/006. nslookup Utility.en.srt
4.52 KB
Chapter 07 Operating System Security and Network Tools/006. nslookup Utility.mp4
10.7 MB
Chapter 07 Operating System Security and Network Tools/007. tcpdump Utility.en.srt
8.67 KB
Chapter 07 Operating System Security and Network Tools/007. tcpdump Utility.mp4
30.01 MB
Chapter 08 System Maintenance, Updates, and Logging/001. Module 7 - System Maintenance, Updates, and Logging.en.srt
783 B
Chapter 08 System Maintenance, Updates, and Logging/001. Module 7 - System Maintenance, Updates, and Logging.mp4
2.96 MB
Chapter 08 System Maintenance, Updates, and Logging/002. Hardware and Software Inventory.en.srt
5.12 KB
Chapter 08 System Maintenance, Updates, and Logging/002. Hardware and Software Inventory.mp4
11.05 MB
Chapter 08 System Maintenance, Updates, and Logging/003. Software and Hardware Updates.en.srt
6.6 KB
Chapter 08 System Maintenance, Updates, and Logging/003. Software and Hardware Updates.mp4
13.66 MB
Chapter 08 System Maintenance, Updates, and Logging/004. System Log Interpretation.en.srt
10.42 KB
Chapter 08 System Maintenance, Updates, and Logging/004. System Log Interpretation.mp4
23.83 MB
Chapter 09 Security Assessment and Risk Analysis/001. Module 8 - Security Assessment and Risk Analysis.en.srt
2.63 KB
Chapter 09 Security Assessment and Risk Analysis/001. Module 8 - Security Assessment and Risk Analysis.mp4
12.27 MB
Chapter 09 Security Assessment and Risk Analysis/002. Vulnerability Management.en.srt
5.58 KB
Chapter 09 Security Assessment and Risk Analysis/002. Vulnerability Management.mp4
11.5 MB
Chapter 09 Security Assessment and Risk Analysis/003. Active vs. Passive Reconnaissance.en.srt
5.74 KB
Chapter 09 Security Assessment and Risk Analysis/003. Active vs. Passive Reconnaissance.mp4
12.18 MB
Chapter 09 Security Assessment and Risk Analysis/004. Port Scanning.en.srt
5.78 KB
Chapter 09 Security Assessment and Risk Analysis/004. Port Scanning.mp4
12.84 MB
Chapter 09 Security Assessment and Risk Analysis/005. Threat Intelligence.en.srt
6.57 KB
Chapter 09 Security Assessment and Risk Analysis/005. Threat Intelligence.mp4
18.68 MB
Chapter 09 Security Assessment and Risk Analysis/006. Vulnerability Response.en.srt
3.91 KB
Chapter 09 Security Assessment and Risk Analysis/006. Vulnerability Response.mp4
6.53 MB
Chapter 09 Security Assessment and Risk Analysis/007. Risk Management.en.srt
10 KB
Chapter 09 Security Assessment and Risk Analysis/007. Risk Management.mp4
16.21 MB
Chapter 09 Security Assessment and Risk Analysis/008. Security Assessments.en.srt
9.58 KB
Chapter 09 Security Assessment and Risk Analysis/008. Security Assessments.mp4
20.42 MB
Chapter 09 Security Assessment and Risk Analysis/009. Disaster Recovery.en.srt
14.38 KB
Chapter 09 Security Assessment and Risk Analysis/009. Disaster Recovery.mp4
28.42 MB
Chapter 09 Security Assessment and Risk Analysis/010. Types of Backups.en.srt
16.72 KB
Chapter 09 Security Assessment and Risk Analysis/010. Types of Backups.mp4
29.03 MB
Chapter 10 Security Incident Response/001. Module 9 - Security Incident Response.en.srt
2.44 KB
Chapter 10 Security Incident Response/001. Module 9 - Security Incident Response.mp4
6.16 MB
Chapter 10 Security Incident Response/002. Stages of Incident Response.en.srt
5.47 KB
Chapter 10 Security Incident Response/002. Stages of Incident Response.mp4
10.5 MB
Chapter 10 Security Incident Response/003. Contrasting SIEM and SOAR.en.srt
9.04 KB
Chapter 10 Security Incident Response/003. Contrasting SIEM and SOAR.mp4
16.93 MB
Chapter 10 Security Incident Response/004. Cyber Kill Chain.en.srt
6.32 KB
Chapter 10 Security Incident Response/004. Cyber Kill Chain.mp4
12.92 MB
Chapter 10 Security Incident Response/005. MITRE ATT&CK Matrix.en.srt
4.44 KB
Chapter 10 Security Incident Response/005. MITRE ATT&CK Matrix.mp4
7.33 MB
Chapter 10 Security Incident Response/006. Diamond Model.en.srt
5.26 KB
Chapter 10 Security Incident Response/006. Diamond Model.mp4
10.11 MB
Chapter 10 Security Incident Response/007. Tactics Techniques and Procedures TTP.en.srt
10.33 KB
Chapter 10 Security Incident Response/007. Tactics Techniques and Procedures TTP.mp4
20.91 MB
Chapter 10 Security Incident Response/008. Evidence.en.srt
5.92 KB
Chapter 10 Security Incident Response/008. Evidence.mp4
10.74 MB
Chapter 10 Security Incident Response/009. Compliance Regulations.en.srt
6.2 KB
Chapter 10 Security Incident Response/009. Compliance Regulations.mp4
12.31 MB
Chapter 11 Exam Preparation/001. Module 10 - Exam Preparation.en.srt
1.24 KB
Chapter 11 Exam Preparation/001. Module 10 - Exam Preparation.mp4
2.19 MB
Chapter 11 Exam Preparation/002. Registering for the Exam.en.srt
4.58 KB
Chapter 11 Exam Preparation/002. Registering for the Exam.mp4
14.73 MB
Chapter 11 Exam Preparation/003. Study Strategies.en.srt
8.05 KB
Chapter 11 Exam Preparation/003. Study Strategies.mp4
24.28 MB
Chapter 11 Exam Preparation/004. What to do on Exam Day.en.srt
6.04 KB
Chapter 11 Exam Preparation/004. What to do on Exam Day.mp4
8.17 MB
Chapter 12 Next Steps/001. Module 11 - Congratulations and Next Steps.en.srt
3.07 KB
Chapter 12 Next Steps/001. Module 11 - Congratulations and Next Steps.mp4
11.34 MB
Chapter 01 Welcome to the Course!/001. Welcome to the Course!.en.srt
6.29 KB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/Extended Named ACL.pdf
416.39 KB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/Extended Numbered ACL.pdf
397.23 KB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/Installing Kali Linux.pdf
32.95 MB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/Installing Wireshark.pdf
10.08 MB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/NETSTAT.pdf
428.02 KB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/NMAP.pdf
10.81 MB
z.9781806023776_Code/Labs Download - CCST Cybersecurity/Standard Numbered ACL.pdf
332.21 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 1 Quiz.pdf
43.76 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 2 Quiz.pdf
57.22 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 3 Quiz.pdf
51.94 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 4 Quiz.pdf
49.44 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 5 Quiz.pdf
54.68 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 6 Quiz.pdf
52.01 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 7 Quiz.pdf
41.29 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 8 Quiz.pdf
54.59 KB
z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 9 Quiz.pdf
54.84 KB
z.9781806023776_Code/Practice Exams Download - CCST Cybersecurity/Practice Exam #1.pdf
650.35 KB
z.9781806023776_Code/Practice Exams Download - CCST Cybersecurity/Practice Exam #2.pdf
181.2 KB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。