TorBT - Torrents and Magnet Links Search Engine
02. Cisco CyberOps Security Monitoring
- Date: 2026-03-29
- Size: 258 MB
- Files: 67
File Name
Size
01. Course Overview/01. Course Overview.mp4
3.5 MB
01. Course Overview/01. Course Overview.srt
2.1 kB
02. Learning About the Attack Surface/01. Course Introduction.mp4
4.3 MB
02. Learning About the Attack Surface/01. Course Introduction.srt
4.4 kB
02. Learning About the Attack Surface/02. Getting Started.mp4
7.7 MB
02. Learning About the Attack Surface/02. Getting Started.srt
8.0 kB
02. Learning About the Attack Surface/03. Whats an Attack Surface.mp4
7.8 MB
02. Learning About the Attack Surface/03. Whats an Attack Surface.srt
3.8 kB
02. Learning About the Attack Surface/04. Network Attacks.mp4
8.1 MB
02. Learning About the Attack Surface/04. Network Attacks.srt
8.0 kB
02. Learning About the Attack Surface/05. Attack Demo.mp4
7.5 MB
02. Learning About the Attack Surface/05. Attack Demo.srt
6.6 kB
02. Learning About the Attack Surface/06. Closing It Out!.mp4
2.4 MB
02. Learning About the Attack Surface/06. Closing It Out!.srt
2.9 kB
03. Discovering Common Attacks/01. The MITRE Attack Framework.mp4
5.6 MB
03. Discovering Common Attacks/01. The MITRE Attack Framework.srt
5.3 kB
03. Discovering Common Attacks/02. Social Engineering.mp4
7.7 MB
03. Discovering Common Attacks/02. Social Engineering.srt
7.1 kB
03. Discovering Common Attacks/03. Social Engineering Demo.mp4
6.9 MB
03. Discovering Common Attacks/03. Social Engineering Demo.srt
4.5 kB
03. Discovering Common Attacks/04. Endpoint-based Attacks.mp4
7.4 MB
03. Discovering Common Attacks/04. Endpoint-based Attacks.srt
6.5 kB
03. Discovering Common Attacks/05. Web Application Attacks.mp4
4.6 MB
03. Discovering Common Attacks/05. Web Application Attacks.srt
4.4 kB
03. Discovering Common Attacks/06. Directory Traversal Demo.mp4
12 MB
03. Discovering Common Attacks/06. Directory Traversal Demo.srt
6.4 kB
03. Discovering Common Attacks/07. Wrapping up Attacks.mp4
1.5 MB
03. Discovering Common Attacks/07. Wrapping up Attacks.srt
2.0 kB
04. Identifying Data Types and Uses/01. Introducing Data Sources.mp4
4.9 MB
04. Identifying Data Types and Uses/01. Introducing Data Sources.srt
2.9 kB
04. Identifying Data Types and Uses/02. Learning About Data types.mp4
8.5 MB
04. Identifying Data Types and Uses/02. Learning About Data types.srt
7.0 kB
04. Identifying Data Types and Uses/03. Seeing Different Data Types.mp4
16 MB
04. Identifying Data Types and Uses/03. Seeing Different Data Types.srt
5.3 kB
04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.mp4
5.6 MB
04. Identifying Data Types and Uses/04. Using Data for Cyber Operations.srt
4.8 kB
04. Identifying Data Types and Uses/05. Additional Data to Use.mp4
8.0 MB
04. Identifying Data Types and Uses/05. Additional Data to Use.srt
5.8 kB
04. Identifying Data Types and Uses/06. Putting the Data Story Together.mp4
13 MB
04. Identifying Data Types and Uses/06. Putting the Data Story Together.srt
6.0 kB
04. Identifying Data Types and Uses/07. Module Review.mp4
1.6 MB
04. Identifying Data Types and Uses/07. Module Review.srt
1.9 kB
05. Concealing the Attack/01. Introduction to Concealment.mp4
2.7 MB
05. Concealing the Attack/01. Introduction to Concealment.srt
3.2 kB
05. Concealing the Attack/02. Reducing Visibility Through Security.mp4
13 MB
05. Concealing the Attack/02. Reducing Visibility Through Security.srt
12 kB
05. Concealing the Attack/03. Visibility Demo VPN Encryption.mp4
14 MB
05. Concealing the Attack/03. Visibility Demo VPN Encryption.srt
4.5 kB
05. Concealing the Attack/04. Evasion and Obfuscation Techniques.mp4
8.4 MB
05. Concealing the Attack/04. Evasion and Obfuscation Techniques.srt
7.9 kB
05. Concealing the Attack/05. Demonstrating Proxies and Encryption.mp4
25 MB
05. Concealing the Attack/05. Demonstrating Proxies and Encryption.srt
7.4 kB
05. Concealing the Attack/06. Concealment Review.mp4
1.5 MB
05. Concealing the Attack/06. Concealment Review.srt
1.8 kB
06. Using Certificates for Security/01. Introduction to Certificates.mp4
4.9 MB
06. Using Certificates for Security/01. Introduction to Certificates.srt
4.8 kB
06. Using Certificates for Security/02. Certificate Functions and Terminology.mp4
7.2 MB
06. Using Certificates for Security/02. Certificate Functions and Terminology.srt
7.3 kB
06. Using Certificates for Security/03. Whats the Impact of Certificates.mp4
4.8 MB
06. Using Certificates for Security/03. Whats the Impact of Certificates.srt
4.7 kB
06. Using Certificates for Security/04. Certificate Components.mp4
6.7 MB
06. Using Certificates for Security/04. Certificate Components.srt
5.6 kB
06. Using Certificates for Security/05. Analyzing Certificates.mp4
10 MB
06. Using Certificates for Security/05. Analyzing Certificates.srt
6.7 kB
06. Using Certificates for Security/06. Lets Wrap!.mp4
3.1 MB
06. Using Certificates for Security/06. Lets Wrap!.srt
4.0 kB
Exercise.zip
10 MB