资源详情

返回首页 | 相关搜索
[ FreeCourseWeb.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 2 Security Monitoring
大小 480.98 MB
文件数 93
Info Hash: AE3CB3D04D6D61A4ECE3D76EA87E9FA1BD7238EC
收录时间 2026-01-22 06:06:24
更新时间 2026-01-22 06:06:24
文件列表 (93)
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/Bonus Resources.txt
357 B
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 00/CyOps 02-Links.pdf
89.16 KB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 01/Challenge Social Engineering.pdf
29.76 KB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 02/CyOps 02 Netflow Demo.pka
639.08 KB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/Challenge Wireshark and DNS.pdf
28.92 KB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 03/DNSCyOps.pcapng
1 KB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_2/Exercise Files/Chapter 04/BONUS_PTActA_ACL.pka
289.95 KB
~Get Your Files Here !/[1] Introduction/[1] Active security monitoring.mp4
5.75 MB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.mp4
2.8 MB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam.srt
1.29 KB
~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.mp4
6.75 MB
~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.srt
3.25 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.mp4
14.22 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[1] Recognizing attack surfaces.srt
5.85 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.mp4
15.71 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[2] Identifying vulnerability testing.srt
7.74 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.mp4
12.55 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[3] Attacking the network.srt
7.18 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.mp4
19.14 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[4] Describing web application attacks.srt
6.7 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.mp4
27.04 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[5] Hacking the human.srt
7.84 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.mp4
13.65 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[6] Investigating endpoint-based attacks.srt
6.34 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.mp4
3.62 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[7] Challenge Research and identify social engineering attacks.srt
1.66 KB
~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.mp4
13.17 MB
~Get Your Files Here !/[2] 1. Understanding Attacks/[8] Solution Research and identify social engineering attacks.srt
5.92 KB
~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.mp4
7.54 MB
~Get Your Files Here !/[3] 2. Examining System Data/[1] Exploring CLI tools.srt
4.05 KB
~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.mp4
25.75 MB
~Get Your Files Here !/[3] 2. Examining System Data/[2] Analyzing data with NetFlow.srt
5.31 KB
~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.mp4
9.63 MB
~Get Your Files Here !/[3] 2. Examining System Data/[3] Monitoring traffic with a stateful firewall.srt
3.81 KB
~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.mp4
7.32 MB
~Get Your Files Here !/[3] 2. Examining System Data/[4] Deploying a next-generation firewall.srt
4.9 KB
~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.mp4
11.33 MB
~Get Your Files Here !/[3] 2. Examining System Data/[5] Having application visibility and control.srt
5.91 KB
~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.mp4
10.57 MB
~Get Your Files Here !/[3] 2. Examining System Data/[6] Filtering web and email content.srt
4.62 KB
~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.mp4
2.92 MB
~Get Your Files Here !/[3] 2. Examining System Data/[7] Challenge Using NetFlow in Packet Tracer.srt
1.23 KB
~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.mp4
15.21 MB
~Get Your Files Here !/[3] 2. Examining System Data/[8] Solution Using NetFlow in Packet Tracer.srt
8.14 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.mp4
10.63 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[1] Obtaining a packet capture with Wireshark.srt
8.53 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.mp4
20.25 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[2] Understanding conversations and endpoints.srt
8.03 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.mp4
15.79 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[3] Visualizing session and transactional data.srt
7.32 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.mp4
10.76 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[4] Analyzing statistical data.srt
4.29 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.mp4
7.22 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[5] Sending alert data.srt
3.54 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.mp4
15.36 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[6] Investigating an IDS alert.srt
9.37 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.mp4
3.82 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[7] Challenge Using Wireshark to examine DNS traffic.srt
1.98 KB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.mp4
9.82 MB
~Get Your Files Here !/[4] 3. Comparing Data Types Used in Security Monitoring/[8] Solution Using Wireshark to examine DNS traffic.srt
3.45 KB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.mp4
9.29 MB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[1] Using an access control list.srt
3.86 KB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.mp4
12.48 MB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[2] Concealing the network using NATPAT.srt
7.43 KB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.mp4
15.61 MB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[3] Evading and hiding techniques.srt
5.99 KB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.mp4
19.47 MB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[4] Tunneling and encapsulation.srt
8.84 KB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.mp4
6.71 MB
~Get Your Files Here !/[5] 4. Limiting Data Visibility/[5] Using encryption to hide.srt
3.14 KB
~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.mp4
10.72 MB
~Get Your Files Here !/[6] 5. Using Certificates/[10] Solution Certificate Authority Stores.srt
6.46 KB
~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.mp4
11.95 MB
~Get Your Files Here !/[6] 5. Using Certificates/[1] Protecting data and networks.srt
5.83 KB
~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.mp4
9.97 MB
~Get Your Files Here !/[6] 5. Using Certificates/[2] Ensuring trust on the Internet.srt
6.18 KB
~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.mp4
6.18 MB
~Get Your Files Here !/[6] 5. Using Certificates/[3] Examining an X.509 certificate.srt
3.36 KB
~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.mp4
5.79 MB
~Get Your Files Here !/[6] 5. Using Certificates/[4] Describing certificate classes.srt
3.68 KB
~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).mp4
7.32 MB
~Get Your Files Here !/[6] 5. Using Certificates/[5] Grasping the public key cryptography standards (PKCS).srt
3.84 KB
~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.mp4
11.88 MB
~Get Your Files Here !/[6] 5. Using Certificates/[6] Managing keys using IKE.srt
6.45 KB
~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.mp4
7.96 MB
~Get Your Files Here !/[6] 5. Using Certificates/[7] Outlining the different protocol versions.srt
3.85 KB
~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.mp4
14.8 MB
~Get Your Files Here !/[6] 5. Using Certificates/[8] Configuring the cipher suite.srt
7.17 KB
~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.mp4
5.95 MB
~Get Your Files Here !/[6] 5. Using Certificates/[9] Challenge Certificate Authority Stores.srt
2.28 KB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4
5.28 MB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt
2.69 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。