TorBT - Torrents and Magnet Links Search Engine
[ FreeCourseWeb.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 3 Host-Based Analysis
- Date: 2022-01-29
- Size: 311 MB
- Files: 69
File Name
Size
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/Bonus Resources.txt
357 B
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_3.zip
123 B
~Get Your Files Here !/[1] Introduction/[1] Securing the endpoints.mp4
5.2 MB
~Get Your Files Here !/[1] Introduction/[1] Securing the endpoints.srt
1.6 kB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.mp4
2.9 MB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.srt
1.3 kB
~Get Your Files Here !/[1] Introduction/[3] Set up your test environment.mp4
7.5 MB
~Get Your Files Here !/[1] Introduction/[3] Set up your test environment.srt
3.6 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[1] Visualize the Windows architecture.mp4
13 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[1] Visualize the Windows architecture.srt
6.8 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[2] Dissect the Windows file system.mp4
13 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[2] Dissect the Windows file system.srt
6.9 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[3] Working with Windows Registry.mp4
13 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[3] Working with Windows Registry.srt
8.0 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[4] Running a Windows OS.mp4
14 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[4] Running a Windows OS.srt
7.5 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[5] Manage network settings.mp4
5.0 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[5] Manage network settings.srt
4.1 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[6] Use netstat.mp4
15 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[6] Use netstat.srt
5.8 kB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[7] Monitor the Windows OS.mp4
7.4 MB
~Get Your Files Here !/[2] 1. Outlining the Window OS/[7] Monitor the Windows OS.srt
5.4 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[1] Recognize the value of a Linux OS.mp4
4.2 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[1] Recognize the value of a Linux OS.srt
2.9 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[2] Interact with a Linux OS.mp4
8.1 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[2] Interact with a Linux OS.srt
3.2 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[3] Use the Linux file system.mp4
7.0 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[3] Use the Linux file system.srt
4.8 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[4] Monitor log files.mp4
14 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[4] Monitor log files.srt
6.8 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[5] Avoid malware on a Linux host.mp4
7.3 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[5] Avoid malware on a Linux host.srt
4.0 kB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[6] Harden the OS.mp4
6.8 MB
~Get Your Files Here !/[3] 2. Discovering the Linux OS/[6] Harden the OS.srt
3.4 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[1] Outline the network architecture.mp4
8.8 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[1] Outline the network architecture.srt
4.1 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[2] Provide defense in depth.mp4
4.9 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[2] Provide defense in depth.srt
3.6 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[3] Simple Network Management Protocol.mp4
9.2 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[3] Simple Network Management Protocol.srt
5.8 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[4] Understand NTP.mp4
9.8 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[4] Understand NTP.srt
4.6 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[5] Challenge Configure NTP.mp4
2.5 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[5] Challenge Configure NTP.srt
1.0 kB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[6] Solution Configure NTP.mp4
14 MB
~Get Your Files Here !/[4] 3. Monitoring the Endpoints/[6] Solution Configure NTP.srt
5.3 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[1] Understand data types used in security monitoring.mp4
13 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[1] Understand data types used in security monitoring.srt
4.8 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[2] Challenge Configure SNMP.mp4
2.1 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[2] Challenge Configure SNMP.srt
1.0 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[3] Solution Configure SNMP.mp4
17 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[3] Solution Configure SNMP.srt
7.6 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[4] Generate a malware analysis report.mp4
21 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[4] Generate a malware analysis report.srt
7.7 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[5] Compare HIDS with NIDS.mp4
11 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[5] Compare HIDS with NIDS.srt
6.5 kB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[6] Use a sandbox to evaluate malicious activity.mp4
10 MB
~Get Your Files Here !/[5] 4. Examining Network Security Data/[6] Use a sandbox to evaluate malicious activity.srt
5.2 kB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[1] Cyber attribution.mp4
13 MB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[1] Cyber attribution.srt
4.7 kB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[2] Outline the digital forensic investigation.mp4
9.4 MB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[2] Outline the digital forensic investigation.srt
3.0 kB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[3] Compare different types of evidence.mp4
8.6 MB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[3] Compare different types of evidence.srt
3.0 kB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[4] Preserve the chain of custody.mp4
9.3 MB
~Get Your Files Here !/[6] 5. Responding to Cybersecurity Incidents/[4] Preserve the chain of custody.srt
5.5 kB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4
3.7 MB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt
2.2 kB