资源详情

返回首页 | 相关搜索
CCNA Cybersecurity (200-201) - Video Training Series (2025)
大小 2.18 GB
文件数 174
Info Hash: E93FB52D1C33E9988E05B01C371E3B500195891F
收录时间 2025-12-12 08:03:53
更新时间 2025-12-16 22:05:54
文件列表 (174)
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Course_Slides_-_CCNA_Cybersecurity_200-201_Video_Training_Series.pdf
657.39 MB
Chapter 1 Welcome to the Course!/001. Welcome to the Course!.mp4
14.81 MB
Chapter 1 Welcome to the Course!/002. Meet Your Instructor.en.srt
1.38 KB
Chapter 1 Welcome to the Course!/002. Meet Your Instructor.mp4
3.84 MB
Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.en.srt
1.87 KB
Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.mp4
6.67 MB
Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.en.srt
6.23 KB
Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.mp4
17.58 MB
Chapter 2 Foundations of Digital Defense/003. The CIA Triad.en.srt
6.52 KB
Chapter 2 Foundations of Digital Defense/003. The CIA Triad.mp4
12.61 MB
Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.en.srt
3.78 KB
Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.mp4
7.08 MB
Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.en.srt
7.82 KB
Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.mp4
16.53 MB
Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.en.srt
15.29 KB
Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.mp4
29.39 MB
Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.en.srt
17.21 KB
Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.mp4
27.49 MB
Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.en.srt
8.49 KB
Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.mp4
14.22 MB
Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.en.srt
6.12 KB
Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.mp4
11.49 MB
Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.en.srt
12.64 KB
Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.mp4
24.88 MB
Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.en.srt
9.07 KB
Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.mp4
16.45 MB
Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.en.srt
12.82 KB
Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.mp4
30.04 MB
Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.en.srt
7.24 KB
Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.mp4
15.26 MB
Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.en.srt
9.71 KB
Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.mp4
21.3 MB
Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).en.srt
6.92 KB
Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).mp4
17.73 MB
Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.en.srt
3.32 KB
Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.mp4
8.42 MB
Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.en.srt
3.41 KB
Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.mp4
13.65 MB
Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.en.srt
5.46 KB
Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.mp4
11.22 MB
Chapter 2 Foundations of Digital Defense/019. Detection Methods.en.srt
5.26 KB
Chapter 2 Foundations of Digital Defense/019. Detection Methods.mp4
10.22 MB
Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.en.srt
1.89 KB
Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.mp4
6.51 MB
Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.en.srt
2.84 KB
Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.mp4
5.94 MB
Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.en.srt
11.72 KB
Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.mp4
25.23 MB
Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.en.srt
9.94 KB
Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.mp4
21.02 MB
Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.en.srt
4.63 KB
Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.mp4
9.32 MB
Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.en.srt
8.82 KB
Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.mp4
15.24 MB
Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.en.srt
15.73 KB
Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.mp4
30.39 MB
Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.en.srt
13.12 KB
Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.mp4
21.19 MB
Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.en.srt
11.24 KB
Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.mp4
29.61 MB
Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.en.srt
8.34 KB
Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.mp4
16.87 MB
Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.en.srt
2.06 KB
Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.mp4
4.72 MB
Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.en.srt
13.14 KB
Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.mp4
27.14 MB
Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.en.srt
3.43 KB
Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.mp4
8.12 MB
Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.en.srt
7.09 KB
Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.mp4
12.33 MB
Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.en.srt
2.74 KB
Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.mp4
6.08 MB
Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.en.srt
3.4 KB
Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.mp4
6.59 MB
Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.en.srt
3 KB
Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.mp4
7.01 MB
Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.en.srt
6.75 KB
Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.mp4
12.88 MB
Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.en.srt
10.5 KB
Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.mp4
20.63 MB
Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.en.srt
2.17 KB
Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.mp4
6.49 MB
Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.en.srt
6.42 KB
Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.mp4
12.4 MB
Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.en.srt
12.01 KB
Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.mp4
34.45 MB
Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.en.srt
16.13 KB
Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.mp4
29.53 MB
Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.en.srt
12.89 KB
Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.mp4
29.4 MB
Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.en.srt
5.17 KB
Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.mp4
9.93 MB
Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.en.srt
10.13 KB
Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.mp4
30.81 MB
Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.en.srt
10.35 KB
Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.mp4
22.68 MB
Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.en.srt
13.08 KB
Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.mp4
24.09 MB
Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.en.srt
2.09 KB
Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.mp4
4.84 MB
Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.en.srt
8.54 KB
Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.mp4
18.94 MB
Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.en.srt
6.98 KB
Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.mp4
14.8 MB
Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).en.srt
6.29 KB
Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).mp4
12.32 MB
Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.en.srt
7.36 KB
Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.mp4
15.42 MB
Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.en.srt
4.48 KB
Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.mp4
12.03 MB
Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.en.srt
14.07 KB
Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.mp4
54.69 MB
Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.en.srt
11.38 KB
Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.mp4
25.24 MB
Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.en.srt
11.48 KB
Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.mp4
25.21 MB
Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.en.srt
9.13 KB
Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.mp4
16.08 MB
Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.en.srt
1.38 KB
Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.mp4
3.9 MB
Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.en.srt
7.32 KB
Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.mp4
15.21 MB
Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.en.srt
7.26 KB
Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.mp4
16.02 MB
Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.en.srt
8.6 KB
Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.mp4
19.05 MB
Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.en.srt
7.26 KB
Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.mp4
15.8 MB
Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.en.srt
6.48 KB
Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.mp4
13.27 MB
Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.en.srt
6.51 KB
Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.mp4
12.62 MB
Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.en.srt
7.87 KB
Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.mp4
15.72 MB
Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.en.srt
6.35 KB
Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.mp4
12.52 MB
Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.en.srt
5.22 KB
Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.mp4
9.61 MB
Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.en.srt
5.93 KB
Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.mp4
11.83 MB
Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.en.srt
1.25 KB
Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.mp4
2.14 MB
Chapter 7 Exam Preparation/002. Registering for the Exam.en.srt
6.02 KB
Chapter 7 Exam Preparation/002. Registering for the Exam.mp4
16.85 MB
Chapter 7 Exam Preparation/003. Study Strategies.en.srt
8.48 KB
Chapter 7 Exam Preparation/003. Study Strategies.mp4
28.18 MB
Chapter 7 Exam Preparation/004. What to do on Exam Day.en.srt
6.08 KB
Chapter 7 Exam Preparation/004. What to do on Exam Day.mp4
8.09 MB
Chapter 8 Next Steps/001. Congratulations and Next Steps.en.srt
2.35 KB
Chapter 8 Next Steps/001. Congratulations and Next Steps.mp4
8.34 MB
Chapter 1 Welcome to the Course!/001. Welcome to the Course!.en.srt
8.34 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 1 Glossary - CCNA Cybersecurity.pdf
51.66 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 2 Glossary - CCNA Cybersecurity.pdf
49.04 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 3 Glossary - CCNA Cybersecurity.pdf
40.32 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 4 Glossary - CCNA Cybersecurity.pdf
40.05 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 5 Glossary - CCNA Cybersecurity.pdf
36.17 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/01 - Installing and Configuring a Virtual Lab Environment.pdf
25.72 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/02 - Network Discovery and Host Enumeration with Nmap.pdf
35.72 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/03 - Packet Analysis and Protocol Identification using Wireshark.pdf
54.46 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/04 - Password Cracking with John the Ripper.pdf
32.46 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/05 - Demonstrating ARP Spoofing and Detection.pdf
37.24 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/06 - Identifying Malware Activity Using Wireshark.pdf
44.05 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/07 - Firewall Configuration and Rule Validation using UFW.pdf
22.21 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/08 - DNS Enumeration Techniques.pdf
21.8 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/09 - Simulating and Identifying Brute Force Attacks.pdf
18.5 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/10 - Web Application Vulnerability Scanning with Nikto.pdf
21.99 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/11 - Using Metasploit Framework for Exploitation Basics.pdf
35.86 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 1 Quiz - CCNA Cybersecurity.pdf
100.07 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 2 Quiz - CCNA Cybersecurity.pdf
95.29 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 3 Quiz - CCNA Cybersecurity.pdf
104.79 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 4 Quiz - CCNA Cybersecurity.pdf
111.37 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 5 Quiz - CCNA Cybersecurity.pdf
89.29 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #1 - CCNA Cybersecurity.pdf
276.05 KB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #2 - CCNA Cybersecurity.pdf
251.29 KB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。