资源详情

返回首页 | 相关搜索
02. Cisco CyberOps Security Monitoring
大小 257.7 MB
文件数 67
Info Hash: 853D69A3B94DD481A6380608149456A8C8F9647C
收录时间 2026-01-10 02:10:10
更新时间 2026-01-10 02:10:10
文件列表 (67)
01. Course Overview/01. Course Overview.mp4
3.45 MB
01. Course Overview/01. Course Overview.srt
2.12 KB
02. Learning About the Attack Surface/01. Course Introduction.mp4
4.28 MB
02. Learning About the Attack Surface/01. Course Introduction.srt
4.39 KB
02. Learning About the Attack Surface/02. Getting Started.mp4
7.66 MB
02. Learning About the Attack Surface/02. Getting Started.srt
8.03 KB
02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4
7.77 MB
02. Learning About the Attack Surface/03. Whats an Attack Surface.srt
3.8 KB
02. Learning About the Attack Surface/04. Network Attacks.mp4
8.09 MB
02. Learning About the Attack Surface/04. Network Attacks.srt
7.99 KB
02. Learning About the Attack Surface/05. Attack Demo.mp4
7.49 MB
02. Learning About the Attack Surface/05. Attack Demo.srt
6.62 KB
02. Learning About the Attack Surface/06. Closing It Out!.mp4
2.38 MB
02. Learning About the Attack Surface/06. Closing It Out!.srt
2.92 KB
03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4
5.62 MB
03. Discovering Common Attacks/01. The MITRE Attack Framework.srt
5.32 KB
03. Discovering Common Attacks/02. Social Engineering.mp4
7.72 MB
03. Discovering Common Attacks/02. Social Engineering.srt
7.12 KB
03. Discovering Common Attacks/03. Social Engineering Demo.mp4
6.88 MB
03. Discovering Common Attacks/03. Social Engineering Demo.srt
4.53 KB
03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4
7.42 MB
03. Discovering Common Attacks/04. Endpoint-based Attacks.srt
6.45 KB
03. Discovering Common Attacks/05. Web Application Attacks.mp4
4.56 MB
03. Discovering Common Attacks/05. Web Application Attacks.srt
4.44 KB
03. Discovering Common Attacks/06. Directory Traversal Demo.mp4
11.99 MB
03. Discovering Common Attacks/06. Directory Traversal Demo.srt
6.4 KB
03. Discovering Common Attacks/07. Wrapping up Attacks.mp4
1.54 MB
03. Discovering Common Attacks/07. Wrapping up Attacks.srt
2.03 KB
04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4
4.89 MB
04. Identifying Data Types and Uses/01. Introducing Data Sources.srt
2.91 KB
04. Identifying Data Types and Uses/02. Learning About Data types.mp4
8.55 MB
04. Identifying Data Types and Uses/02. Learning About Data types.srt
6.98 KB
04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4
16.02 MB
04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt
5.26 KB
04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4
5.59 MB
04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt
4.84 KB
04. Identifying Data Types and Uses/05. Additional Data to Use.mp4
8.01 MB
04. Identifying Data Types and Uses/05. Additional Data to Use.srt
5.8 KB
04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4
13.39 MB
04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt
5.96 KB
04. Identifying Data Types and Uses/07. Module Review.mp4
1.6 MB
04. Identifying Data Types and Uses/07. Module Review.srt
1.94 KB
05. Concealing the Attack/01. Introduction to Concealment.mp4
2.73 MB
05. Concealing the Attack/01. Introduction to Concealment.srt
3.24 KB
05. Concealing the Attack/02. Reducing Visibility Through Security.mp4
13.1 MB
05. Concealing the Attack/02. Reducing Visibility Through Security.srt
11.57 KB
05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4
14.17 MB
05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt
4.51 KB
05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4
8.41 MB
05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt
7.87 KB
05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4
25.32 MB
05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt
7.36 KB
05. Concealing the Attack/06. Concealment Review.mp4
1.51 MB
05. Concealing the Attack/06. Concealment Review.srt
1.78 KB
06. Using Certificates for Security/01. Introduction to Certificates.mp4
4.88 MB
06. Using Certificates for Security/01. Introduction to Certificates.srt
4.82 KB
06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4
7.25 MB
06. Using Certificates for Security/02. Certificate Functions and Terminology.srt
7.35 KB
06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4
4.82 MB
06. Using Certificates for Security/03. Whats the Impact of Certificates.srt
4.73 KB
06. Using Certificates for Security/04. Certificate Components.mp4
6.73 MB
06. Using Certificates for Security/04. Certificate Components.srt
5.61 KB
06. Using Certificates for Security/05. Analyzing Certificates.mp4
10.36 MB
06. Using Certificates for Security/05. Analyzing Certificates.srt
6.66 KB
06. Using Certificates for Security/06. Lets Wrap!.mp4
3.08 MB
06. Using Certificates for Security/06. Lets Wrap!.srt
4.05 KB
Exercise.zip
10.26 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。