Cisco CyberOps Associate (200-201)
File Information:
File List:
- Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.mp4 134.41 MB
- Chapter 5 Network Security and Forensic Analysis/004. Identify Protected Data in a Network.mp4 121.79 MB
- Chapter 1 Cybersecurity Operations Essentials/012. Identify Data Loss from Traffic Profiles.mp4 121.15 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/006. Identify Intrusion Elements from a PCAP file.mp4 116.66 MB
- Chapter 2 Cybersecurity Analysis Essentials/008. Describe Network Attacks.mp4 113.37 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/003. Identify Ubuntu Components.mp4 111.29 MB
- Chapter 2 Cybersecurity Analysis Essentials/006. Identify Technology Impact on Data Visibility.mp4 109.02 MB
- Chapter 1 Cybersecurity Operations Essentials/002. Describe the CIA Triad.mp4 108.61 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/008. Interpret Basic Regular Expressions.mp4 108.30 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/004. Compare Traffic Analysis Techniques.mp4 107.37 MB
- Chapter 2 Cybersecurity Analysis Essentials/002. Identify tcpdump and NetFlow.mp4 103.28 MB
- Chapter 2 Cybersecurity Analysis Essentials/009. Describe Web Application Attacks.mp4 102.81 MB
- Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.mp4 99.61 MB
- Chapter 5 Network Security and Forensic Analysis/001. Describe NIST SP 800-86 Concepts.mp4 99.47 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/002. Identify Source Technology and Events.mp4 99.44 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/001. Describe Endpoint-based Attacks.mp4 97.24 MB
- Chapter 5 Network Security and Forensic Analysis/006. Integrate Forensic Elements into Incident Analysis.mp4 94.51 MB
- Chapter 1 Cybersecurity Operations Essentials/010. Compare Access Control Models.mp4 94.31 MB
- Chapter 1 Cybersecurity Operations Essentials/003. Describe Security Approaches.mp4 93.32 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/001. Categorize Intrusion Events.mp4 92.47 MB
- Chapter 1 Cybersecurity Operations Essentials/006. Differentiate Security Concepts.mp4 91.54 MB
- Chapter 2 Cybersecurity Analysis Essentials/011. Describe Evasion and Obfuscation.mp4 90.93 MB
- Chapter 1 Cybersecurity Operations Essentials/008. Describe CVSS Terminology.mp4 90.69 MB
- Chapter 5 Network Security and Forensic Analysis/002. Describe Security Management Concepts.mp4 89.74 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/007. Interpret Output from a Malware Analysis Tool.mp4 88.94 MB
- Chapter 1 Cybersecurity Operations Essentials/004. Describe Security Tools and Practices.mp4 88.48 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/005. Identify Types of Evidence based on Logs.mp4 87.69 MB
- Chapter 1 Cybersecurity Operations Essentials/007. Identify Risk Management Methods.mp4 87.68 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/005. Extract Files from a TCP Stream.mp4 87.58 MB
- Chapter 2 Cybersecurity Analysis Essentials/007. Know Network Security Data Types.mp4 87.43 MB
- Chapter 1 Cybersecurity Operations Essentials/009. Compare Security Deployments.mp4 85.56 MB
- Chapter 1 Cybersecurity Operations Essentials/005. Describe Threat Actor Types.mp4 85.53 MB
- Chapter 2 Cybersecurity Analysis Essentials/010. Describe Social Engineering Attacks.mp4 84.82 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/006. Compare Disk Images.mp4 84.70 MB
- Chapter 5 Network Security and Forensic Analysis/003. Describe SOC Metrics and Scope Analysis.mp4 84.05 MB
- Chapter 1 Cybersecurity Operations Essentials/011. Identify Data Visibility Challenges.mp4 80.81 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/004. Identify Attribution in an Investigation.mp4 80.52 MB
- Chapter 1 Cybersecurity Operations Essentials/014. Compare Detection Methodologies.mp4 79.67 MB
- Chapter 2 Cybersecurity Analysis Essentials/005. Identify Application Visibility and Control Data.mp4 79.16 MB
- Chapter 1 Cybersecurity Operations Essentials/001. Overview.mp4 78.90 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/007. Interpret Artifact Elements from an Event.mp4 77.56 MB
- Chapter 2 Cybersecurity Analysis Essentials/003. Identify Firewall Data.mp4 76.93 MB
- Chapter 2 Cybersecurity Analysis Essentials/001. Compare Attack Surface and Vulnerability.mp4 73.65 MB
- Chapter 4 Advanced Intrusion Analysis Techniques/003. Compare Firewall Operations.mp4 71.89 MB
- Chapter 3 Exploring Cybersecurity Investigation Techniques/002. Identify Windows 10 Components.mp4 64.52 MB
- Chapter 1 Cybersecurity Operations Essentials/013. Use 5-tuple Approach to Isolate a Host.mp4 63.08 MB
- Chapter 5 Network Security and Forensic Analysis/007. Identify Elements of an IRP.mp4 60.20 MB
- Chapter 2 Cybersecurity Analysis Essentials/004. Identify Content Filtering Data.mp4 54.37 MB
- Chapter 2 Cybersecurity Analysis Essentials/012. Identify Certificate Components.en.srt 36 KB
- Chapter 5 Network Security and Forensic Analysis/005. Identify Network and Server Profiling Elements.en.srt 35 KB
Cisco CyberOps Associate (200-201)
Hot Tags: