资源详情

返回首页 | 相关搜索
[ WebToolTip.com ] Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep
大小 820.1 MB
文件数 160
Info Hash: 59312404B6F09BD7BAD22CE73D8E8C081DB7B3F3
收录时间 2025-12-20 08:04:07
更新时间 2025-12-20 09:54:45
文件列表 (160)
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01 - Introduction/01 - Welcome to the course.mp4
7.83 MB
~Get Your Files Here !/01 - Introduction/01 - Welcome to the course.srt
6.27 KB
~Get Your Files Here !/01 - Introduction/02 - Meet your instructor.mp4
2.47 MB
~Get Your Files Here !/01 - Introduction/02 - Meet your instructor.srt
1.49 KB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/01 - Module 1 Cybersecurity essentials and core concepts.mp4
1.64 MB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/01 - Module 1 Cybersecurity essentials and core concepts.srt
1.01 KB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/02 - Cybersecurity defined.mp4
11.77 MB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/02 - Cybersecurity defined.srt
6.49 KB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/03 - CIA triad.mp4
8.7 MB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/03 - CIA triad.srt
6.99 KB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/04 - Vulnerabilities, threats, exploits, and risks.mp4
4.86 MB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/04 - Vulnerabilities, threats, exploits, and risks.srt
4.22 KB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/05 - Attack vectors.mp4
16.4 MB
~Get Your Files Here !/02 - 1. Cybersecurity Essentials and Core Concepts/05 - Attack vectors.srt
14.28 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/01 - Module 2 Threat landscape and attack motives.mp4
1.47 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/01 - Module 2 Threat landscape and attack motives.srt
842 B
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/02 - Categories of attackers.mp4
4.34 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/02 - Categories of attackers.srt
4.71 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/03 - Motivation for attacks.mp4
3.3 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/03 - Motivation for attacks.srt
3.54 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/04 - Malware.mp4
8.44 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/04 - Malware.srt
7.51 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/05 - Social engineering attacks.mp4
18.27 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/05 - Social engineering attacks.srt
14.15 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/06 - Physical attacks.mp4
6.4 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/06 - Physical attacks.srt
5.52 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/07 - Denial of service (DoS) attacks.mp4
11.23 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/07 - Denial of service (DoS) attacks.srt
9.48 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/08 - Man-in-the-middle attacks.mp4
20.35 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/08 - Man-in-the-middle attacks.srt
16.8 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/09 - Internet of things (IoT) weaknesses.mp4
8.18 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/09 - Internet of things (IoT) weaknesses.srt
6.16 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/10 - Bring your own device (BYOD) considerations.mp4
8.53 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/10 - Bring your own device (BYOD) considerations.srt
8.26 KB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/11 - Advanced persistent threat (APT).mp4
5.34 MB
~Get Your Files Here !/03 - 2. Threat Landscape and Attack Motives/11 - Advanced persistent threat (APT).srt
4.91 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/01 - Module 3 Strengthening your security posture.mp4
1.36 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/01 - Module 3 Strengthening your security posture.srt
833 B
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/02 - Defense in depth.mp4
17.92 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/02 - Defense in depth.srt
16.19 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/03 - System hardening.mp4
9.53 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/03 - System hardening.srt
6.26 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/04 - Multi-factor authentication (MFA).mp4
3.74 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/04 - Multi-factor authentication (MFA).srt
3.75 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/05 - Password policies and alternatives.mp4
8.4 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/05 - Password policies and alternatives.srt
6.71 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/06 - Authentication, authorization, and accounting (AAA).mp4
6.84 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/06 - Authentication, authorization, and accounting (AAA).srt
6.74 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/07 - Encryption.mp4
20.09 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/07 - Encryption.srt
15.6 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/08 - Protocols supporting encryption.mp4
10.32 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/08 - Protocols supporting encryption.srt
7.85 KB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/09 - Code of ethics.mp4
6.53 MB
~Get Your Files Here !/04 - 3. Strengthening Your Security Posture/09 - Code of ethics.srt
5.62 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/01 - Module 4 Network foundations and security fundamentals.mp4
1.59 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/01 - Module 4 Network foundations and security fundamentals.srt
958 B
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/02 - TCPIP protocol weaknesses.mp4
26.15 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/02 - TCPIP protocol weaknesses.srt
17.96 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/03 - MAC address security considerations.mp4
8.41 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/03 - MAC address security considerations.srt
7.5 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/04 - IPv4 and IPv6 address security considerations.mp4
22.9 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/04 - IPv4 and IPv6 address security considerations.srt
17.38 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/05 - Security appliances.mp4
13.72 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/05 - Security appliances.srt
12.94 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/06 - Cloud security considerations.mp4
10.47 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/06 - Cloud security considerations.srt
7.53 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/07 - Proxy servers.mp4
6.68 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/07 - Proxy servers.srt
5.6 KB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/08 - Honeypots and honeynets.mp4
2.5 MB
~Get Your Files Here !/05 - 4. Network Foundations and Security Fundamentals/08 - Honeypots and honeynets.srt
2.05 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/01 - Module 5 Controlling access and protecting the network edge.mp4
1.66 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/01 - Module 5 Controlling access and protecting the network edge.srt
1.04 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/02 - Access control list (ACL) overview.mp4
8.43 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/02 - Access control list (ACL) overview.srt
7.65 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/03 - Numbered standard ACLs.mp4
15.67 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/03 - Numbered standard ACLs.srt
12.1 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/04 - Numbered extended ACLs.mp4
21.79 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/04 - Numbered extended ACLs.srt
16.06 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/05 - Named ACLs.mp4
29.54 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/05 - Named ACLs.srt
20.87 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/06 - ACL considerations.mp4
19.71 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/06 - ACL considerations.srt
14.64 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/07 - Virtual private networks (VPNs).mp4
18.34 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/07 - Virtual private networks (VPNs).srt
16.69 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/08 - Network access control (NAC).mp4
15.9 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/08 - Network access control (NAC).srt
13.19 KB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/09 - Securing a small officehome office (SOHO) wireless LAN.mp4
24.05 MB
~Get Your Files Here !/06 - 5. Controlling Access and Protecting the Network Edge/09 - Securing a small officehome office (SOHO) wireless LAN.srt
18.88 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/01 - Module 6 Operating system security and network tools.mp4
6.33 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/01 - Module 6 Operating system security and network tools.srt
2.86 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/02 - Microsoft Windows security considerations.mp4
19.15 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/02 - Microsoft Windows security considerations.srt
12.69 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/03 - macOS security considerations.mp4
20.32 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/03 - macOS security considerations.srt
16.4 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/04 - Linux security considerations.mp4
17.83 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/04 - Linux security considerations.srt
14.62 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/05 - netstat utility.mp4
12.3 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/05 - netstat utility.srt
7.31 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/06 - nslookup utility.mp4
6 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/06 - nslookup utility.srt
4.59 KB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/07 - tcpdump utility.mp4
16.21 MB
~Get Your Files Here !/07 - 6. Operating System Security and Network Tools/07 - tcpdump utility.srt
9.23 KB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/01 - Module 7 System maintenance, updates, and logging.mp4
1.59 MB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/01 - Module 7 System maintenance, updates, and logging.srt
858 B
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/02 - Hardware and software inventory.mp4
7.09 MB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/02 - Hardware and software inventory.srt
5.45 KB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/03 - Software and hardware updates.mp4
8.59 MB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/03 - Software and hardware updates.srt
6.66 KB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/04 - System log interpretation.mp4
14.06 MB
~Get Your Files Here !/08 - 7. System Maintenance, Updates, and Logging/04 - System log interpretation.srt
10.66 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/01 - Module 8 Security assessment and risk analysis.mp4
4.94 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/01 - Module 8 Security assessment and risk analysis.srt
2.69 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/02 - Vulnerability management.mp4
7.33 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/02 - Vulnerability management.srt
5.74 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/03 - Active vs. passive reconnaissance.mp4
7.63 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/03 - Active vs. passive reconnaissance.srt
6.15 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/04 - Port scanning.mp4
8.05 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/04 - Port scanning.srt
5.82 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/05 - Threat intelligence.mp4
11.09 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/05 - Threat intelligence.srt
6.73 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/06 - Vulnerability response.mp4
4.29 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/06 - Vulnerability response.srt
3.93 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/07 - Risk management.mp4
10.95 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/07 - Risk management.srt
10.47 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/08 - Security assessments.mp4
12.46 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/08 - Security assessments.srt
9.85 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/09 - Disaster recovery.mp4
18.34 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/09 - Disaster recovery.srt
14.51 KB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/10 - Types of backups.mp4
19.84 MB
~Get Your Files Here !/09 - 8. Security Assessment and Risk Analysis/10 - Types of backups.srt
16.82 KB
~Get Your Files Here !/10 - 9. Security Incident Response/01 - Module 9 Security incident response.mp4
3.86 MB
~Get Your Files Here !/10 - 9. Security Incident Response/01 - Module 9 Security incident response.srt
2.45 KB
~Get Your Files Here !/10 - 9. Security Incident Response/02 - Stages of incident response.mp4
7.06 MB
~Get Your Files Here !/10 - 9. Security Incident Response/02 - Stages of incident response.srt
5.52 KB
~Get Your Files Here !/10 - 9. Security Incident Response/03 - Contrasting SIEM and SOAR.mp4
11.25 MB
~Get Your Files Here !/10 - 9. Security Incident Response/03 - Contrasting SIEM and SOAR.srt
9.24 KB
~Get Your Files Here !/10 - 9. Security Incident Response/04 - Cyber kill chain.mp4
8.18 MB
~Get Your Files Here !/10 - 9. Security Incident Response/04 - Cyber kill chain.srt
6.64 KB
~Get Your Files Here !/10 - 9. Security Incident Response/05 - MITRE ATT&CK matrix.mp4
5.06 MB
~Get Your Files Here !/10 - 9. Security Incident Response/05 - MITRE ATT&CK matrix.srt
4.45 KB
~Get Your Files Here !/10 - 9. Security Incident Response/06 - Diamond model.mp4
6.5 MB
~Get Your Files Here !/10 - 9. Security Incident Response/06 - Diamond model.srt
5.34 KB
~Get Your Files Here !/10 - 9. Security Incident Response/07 - Tactics, techniques, and procedures (TTP).mp4
13.63 MB
~Get Your Files Here !/10 - 9. Security Incident Response/07 - Tactics, techniques, and procedures (TTP).srt
10.75 KB
~Get Your Files Here !/10 - 9. Security Incident Response/08 - Evidence.mp4
6.9 MB
~Get Your Files Here !/10 - 9. Security Incident Response/08 - Evidence.srt
5.84 KB
~Get Your Files Here !/10 - 9. Security Incident Response/09 - Compliance regulations.mp4
7.69 MB
~Get Your Files Here !/10 - 9. Security Incident Response/09 - Compliance regulations.srt
6.17 KB
~Get Your Files Here !/11 - 10. Exam Preparation/01 - Module 10 Exam preparation.mp4
1.53 MB
~Get Your Files Here !/11 - 10. Exam Preparation/01 - Module 10 Exam preparation.srt
1.34 KB
~Get Your Files Here !/11 - 10. Exam Preparation/02 - Registering for the exam.mp4
6.75 MB
~Get Your Files Here !/11 - 10. Exam Preparation/02 - Registering for the exam.srt
4.87 KB
~Get Your Files Here !/11 - 10. Exam Preparation/03 - Study strategies.mp4
13.98 MB
~Get Your Files Here !/11 - 10. Exam Preparation/03 - Study strategies.srt
8.28 KB
~Get Your Files Here !/11 - 10. Exam Preparation/04 - What to do on exam day.mp4
5.62 MB
~Get Your Files Here !/11 - 10. Exam Preparation/04 - What to do on exam day.srt
6.05 KB
~Get Your Files Here !/12 - 11. Congratulations and Next Steps/01 - Module 11 Congratulations and next steps.mp4
5.3 MB
~Get Your Files Here !/12 - 11. Congratulations and Next Steps/01 - Module 11 Congratulations and next steps.srt
3.13 KB
~Get Your Files Here !/Bonus Resources.txt
70 B

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。