TorBT - Torrents and Magnet Links Search Engine

[ DevCourseWeb.com ] Udemy - Cisco CyberOps Associate CBROPS 200-201 - Part 1 Course

File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/01 - Cisco CyberOps Associate CBROPS 200-201 Part 1 Course/001 Introduction.mp4
4.4 MB
~Get Your Files Here !/01 - Cisco CyberOps Associate CBROPS 200-201 Part 1 Course/002 Kali Install.mp4
23 MB
~Get Your Files Here !/01 - Cisco CyberOps Associate CBROPS 200-201 Part 1 Course/external-assets-links.txt
607 B
~Get Your Files Here !/02 - Network Concepts/001 Network Fundamentals.mp4
55 MB
~Get Your Files Here !/02 - Network Concepts/002 Network Protocols - ICMP.mp4
15 MB
~Get Your Files Here !/02 - Network Concepts/003 Network Protocols - ARP.mp4
8.3 MB
~Get Your Files Here !/02 - Network Concepts/004 Network Protocols - DHCP.mp4
10 MB
~Get Your Files Here !/02 - Network Concepts/005 Network Protocols - DNS.mp4
6.6 MB
~Get Your Files Here !/02 - Network Concepts/006 Network Devices.mp4
9.0 MB
~Get Your Files Here !/02 - Network Concepts/007 Firewalls.mp4
5.6 MB
~Get Your Files Here !/02 - Network Concepts/008 IPS & AMP.mp4
42 MB
~Get Your Files Here !/02 - Network Concepts/009 Email & Web Security.mp4
2.7 MB
~Get Your Files Here !/02 - Network Concepts/010 Inline Traffic Interrogation, Taps & NetFlow.mp4
3.4 MB
~Get Your Files Here !/02 - Network Concepts/external-assets-links.txt
147 B
~Get Your Files Here !/03 - Security Concepts/001 CIA Triad.mp4
2.3 MB
~Get Your Files Here !/03 - Security Concepts/002 Defense in Depth Strategy.mp4
3.4 MB
~Get Your Files Here !/03 - Security Concepts/003 Vulnerabilities.mp4
18 MB
~Get Your Files Here !/03 - Security Concepts/004 Exploits.mp4
18 MB
~Get Your Files Here !/03 - Security Concepts/005 Risks.mp4
2.6 MB
~Get Your Files Here !/03 - Security Concepts/006 Security Terms.mp4
9.9 MB
~Get Your Files Here !/03 - Security Concepts/007 Access Control Models.mp4
3.3 MB
~Get Your Files Here !/03 - Security Concepts/008 Threat Hunting.mp4
2.2 MB
~Get Your Files Here !/03 - Security Concepts/009 Zero Trust.mp4
10 MB
~Get Your Files Here !/03 - Security Concepts/010 Threat intelligence platform (TIP).mp4
6.3 MB
~Get Your Files Here !/03 - Security Concepts/011 Authentication, Authorization, and Accounting.mp4
61 MB
~Get Your Files Here !/03 - Security Concepts/012 Rule-based, Time-based & Role-based Access Control.mp4
2.1 MB
~Get Your Files Here !/03 - Security Concepts/013 CVSS 3.0.mp4
54 MB
~Get Your Files Here !/03 - Security Concepts/014 5-tuple.mp4
15 MB
~Get Your Files Here !/03 - Security Concepts/015 Rule-based detection vs. Behavioral and Statistical detection.mp4
13 MB
~Get Your Files Here !/03 - Security Concepts/9334310-golismero-vulnerability-scan-command.txt
67 B
~Get Your Files Here !/03 - Security Concepts/external-assets-links.txt
145 B
~Get Your Files Here !/04 - Security Monitoring/001 Attack Surface Analysis.mp4
8.6 MB
~Get Your Files Here !/04 - Security Monitoring/002 Network Attacks.mp4
18 MB
~Get Your Files Here !/04 - Security Monitoring/003 Web Application Attacks.mp4
12 MB
~Get Your Files Here !/04 - Security Monitoring/004 Endpoint-Based Attacks.mp4
28 MB
~Get Your Files Here !/04 - Security Monitoring/005 Social Engineering and Phishing Attacks.mp4
26 MB
~Get Your Files Here !/04 - Security Monitoring/006 Evasion Methods.mp4
39 MB
~Get Your Files Here !/04 - Security Monitoring/007 Network Logging.mp4
54 MB
~Get Your Files Here !/04 - Security Monitoring/008 Packet Captures.mp4
48 MB
~Get Your Files Here !/04 - Security Monitoring/009 NetFlow.mp4
14 MB
~Get Your Files Here !/04 - Security Monitoring/010 Application Visibility and Control (AVC).mp4
4.5 MB
~Get Your Files Here !/04 - Security Monitoring/011 Monitoring Challenges.mp4
7.2 MB
~Get Your Files Here !/04 - Security Monitoring/012 NextGen IPS Event Types.mp4
7.3 MB
~Get Your Files Here !/04 - Security Monitoring/013 Encryption and Hashing.mp4
7.9 MB
~Get Your Files Here !/04 - Security Monitoring/014 PKI.mp4
26 MB
~Get Your Files Here !/04 - Security Monitoring/external-assets-links.txt
538 B
~Get Your Files Here !/05 - Host-Based Analysis/001 Microsoft Windows - Introduction.mp4
29 MB
~Get Your Files Here !/05 - Host-Based Analysis/002 Microsoft Windows - Terms.mp4
46 MB
~Get Your Files Here !/05 - Host-Based Analysis/003 Linux - Introduction.mp4
6.4 MB
~Get Your Files Here !/05 - Host-Based Analysis/004 Linux - Terms.mp4
48 MB
~Get Your Files Here !/05 - Host-Based Analysis/005 Endpoint Protection.mp4
7.5 MB
~Get Your Files Here !/05 - Host-Based Analysis/006 Whitelisting and Blacklisting.mp4
13 MB
~Get Your Files Here !/05 - Host-Based Analysis/007 Systems-Based Sandboxing.mp4
9.5 MB
~Get Your Files Here !/05 - Host-Based Analysis/008 System Logs.mp4
23 MB
~Get Your Files Here !/05 - Host-Based Analysis/009 Malware Analysis Tool Report.mp4
18 MB
~Get Your Files Here !/05 - Host-Based Analysis/010 Indicators of Compromise and Attack.mp4
8.2 MB
~Get Your Files Here !/05 - Host-Based Analysis/011 Evidence and Attribution.mp4
7.7 MB
~Get Your Files Here !/05 - Host-Based Analysis/9828976-Linux-Command-Reference.pdf
204 kB
~Get Your Files Here !/05 - Host-Based Analysis/9829046-Windows-Command-Reference.pdf
575 kB
~Get Your Files Here !/05 - Host-Based Analysis/external-assets-links.txt
241 B
~Get Your Files Here !/Bonus Resources.txt
386 B