TorBT - Torrents and Magnet Links Search Engine

03. Cisco CyberOps Analyzing Hosts

File Name
Size
01. Course Overview/01. Course Overview.mp4
3.1 MB
01. Course Overview/01. Course Overview.srt
2.2 kB
02. Securing the Host/01. Introducing Host-based Analysis.mp4
8.6 MB
02. Securing the Host/01. Introducing Host-based Analysis.srt
7.9 kB
02. Securing the Host/02. Host-based IDS and Firewalls.mp4
4.2 MB
02. Securing the Host/02. Host-based IDS and Firewalls.srt
3.9 kB
02. Securing the Host/03. Antimalware and Antivirus.mp4
6.5 MB
02. Securing the Host/03. Antimalware and Antivirus.srt
5.5 kB
02. Securing the Host/04. Systems-based Sandboxing.mp4
5.9 MB
02. Securing the Host/04. Systems-based Sandboxing.srt
5.1 kB
02. Securing the Host/05. Application Allow and Block Lists.mp4
5.1 MB
02. Securing the Host/05. Application Allow and Block Lists.srt
4.6 kB
02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.mp4
19 MB
02. Securing the Host/06. Exploring Host Security Monitoring Capabilities.srt
8.7 kB
03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.mp4
5.5 MB
03. Identifying and Interpreting Windows Components and Logs/01. Introduction to the Windows OS.srt
3.5 kB
03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.mp4
14 MB
03. Identifying and Interpreting Windows Components and Logs/02. Understanding the Windows Components.srt
9.2 kB
03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.mp4
5.3 MB
03. Identifying and Interpreting Windows Components and Logs/03. Exploring File Systems.srt
5.1 kB
03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.mp4
5.3 MB
03. Identifying and Interpreting Windows Components and Logs/04. Reviewing Windows Security Tools and Logs.srt
5.5 kB
03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.mp4
15 MB
03. Identifying and Interpreting Windows Components and Logs/05. Viewing Windows OS Logs.srt
7.3 kB
03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.mp4
1.8 MB
03. Identifying and Interpreting Windows Components and Logs/06. Wrapping up Windows Components.srt
2.1 kB
04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.mp4
7.5 MB
04. Understanding Linux Security Components and Log Usage/01. Introduction to Linux.srt
4.9 kB
04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.mp4
19 MB
04. Understanding Linux Security Components and Log Usage/02. Understanding the Linux Components.srt
9.0 kB
04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.mp4
15 MB
04. Understanding Linux Security Components and Log Usage/03. Exploring File Systems.srt
8.5 kB
04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.mp4
5.4 MB
04. Understanding Linux Security Components and Log Usage/04. Reviewing Linux Security Tools and Logs.srt
6.3 kB
04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.mp4
26 MB
04. Understanding Linux Security Components and Log Usage/05. Viewing Linux OS Logs.srt
6.8 kB
04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.mp4
2.0 MB
04. Understanding Linux Security Components and Log Usage/06. Wrapping up Linux Components.srt
2.4 kB
05. Investigating an Attack/01. Investigating an Attack.mp4
2.2 MB
05. Investigating an Attack/01. Investigating an Attack.srt
2.3 kB
05. Investigating an Attack/02. Investigation Terminology.mp4
6.7 MB
05. Investigating an Attack/02. Investigation Terminology.srt
5.2 kB
05. Investigating an Attack/03. Attack Attribution.mp4
5.0 MB
05. Investigating an Attack/03. Attack Attribution.srt
5.0 kB
05. Investigating an Attack/04. Investigation Evidence.mp4
5.1 MB
05. Investigating an Attack/04. Investigation Evidence.srt
5.1 kB
05. Investigating an Attack/05. Finding the Evidence.mp4
8.9 MB
05. Investigating an Attack/05. Finding the Evidence.srt
5.3 kB
05. Investigating an Attack/06. Tampering with Disk Images.mp4
13 MB
05. Investigating an Attack/06. Tampering with Disk Images.srt
8.0 kB
05. Investigating an Attack/07. Wrapping up Investigations.mp4
1.9 MB
05. Investigating an Attack/07. Wrapping up Investigations.srt
2.3 kB
06. Using Malware Analysis Tools/01. Malware Analysis.mp4
5.6 MB
06. Using Malware Analysis Tools/01. Malware Analysis.srt
5.6 kB
06. Using Malware Analysis Tools/02. Malware Analysis Tools.mp4
4.6 MB
06. Using Malware Analysis Tools/02. Malware Analysis Tools.srt
4.7 kB
06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.mp4
9.8 MB
06. Using Malware Analysis Tools/03. Using Malware Analysis Tools.srt
4.3 kB
06. Using Malware Analysis Tools/04. Reporting.mp4
24 MB
06. Using Malware Analysis Tools/04. Reporting.srt
9.5 kB
06. Using Malware Analysis Tools/05. Putting It All Together.mp4
2.7 MB
06. Using Malware Analysis Tools/05. Putting It All Together.srt
3.0 kB
06. Using Malware Analysis Tools/06. Lets Wrap!.mp4
4.2 MB
06. Using Malware Analysis Tools/06. Lets Wrap!.srt
2.8 kB
Exercise.zip
8.1 MB