TorBT - Torrents and Magnet Links Search Engine

CCNA Cybersecurity (200-201) - Video Training Series (2025)

File Name
Size
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Course_Slides_-_CCNA_Cybersecurity_200-201_Video_Training_Series.pdf
657 MB
Chapter 1 Welcome to the Course!/001. Welcome to the Course!.mp4
15 MB
Chapter 1 Welcome to the Course!/002. Meet Your Instructor.en.srt
1.4 kB
Chapter 1 Welcome to the Course!/002. Meet Your Instructor.mp4
3.8 MB
Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.en.srt
1.9 kB
Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.mp4
6.7 MB
Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.en.srt
6.2 kB
Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.mp4
18 MB
Chapter 2 Foundations of Digital Defense/003. The CIA Triad.en.srt
6.5 kB
Chapter 2 Foundations of Digital Defense/003. The CIA Triad.mp4
13 MB
Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.en.srt
3.8 kB
Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.mp4
7.1 MB
Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.en.srt
7.8 kB
Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.mp4
16 MB
Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.en.srt
15 kB
Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.mp4
29 MB
Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.en.srt
17 kB
Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.mp4
28 MB
Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.en.srt
8.5 kB
Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.mp4
14 MB
Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.en.srt
6.1 kB
Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.mp4
12 MB
Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.en.srt
13 kB
Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.mp4
25 MB
Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.en.srt
9.1 kB
Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.mp4
16 MB
Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.en.srt
13 kB
Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.mp4
30 MB
Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.en.srt
7.2 kB
Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.mp4
15 MB
Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.en.srt
9.7 kB
Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.mp4
21 MB
Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).en.srt
6.9 kB
Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).mp4
18 MB
Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.en.srt
3.3 kB
Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.mp4
8.4 MB
Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.en.srt
3.4 kB
Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.mp4
14 MB
Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.en.srt
5.5 kB
Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.mp4
11 MB
Chapter 2 Foundations of Digital Defense/019. Detection Methods.en.srt
5.3 kB
Chapter 2 Foundations of Digital Defense/019. Detection Methods.mp4
10 MB
Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.en.srt
1.9 kB
Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.mp4
6.5 MB
Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.en.srt
2.8 kB
Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.mp4
5.9 MB
Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.en.srt
12 kB
Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.mp4
25 MB
Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.en.srt
9.9 kB
Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.mp4
21 MB
Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.en.srt
4.6 kB
Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.mp4
9.3 MB
Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.en.srt
8.8 kB
Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.mp4
15 MB
Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.en.srt
16 kB
Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.mp4
30 MB
Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.en.srt
13 kB
Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.mp4
21 MB
Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.en.srt
11 kB
Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.mp4
30 MB
Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.en.srt
8.3 kB
Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.mp4
17 MB
Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.en.srt
2.1 kB
Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.mp4
4.7 MB
Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.en.srt
13 kB
Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.mp4
27 MB
Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.en.srt
3.4 kB
Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.mp4
8.1 MB
Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.en.srt
7.1 kB
Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.mp4
12 MB
Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.en.srt
2.7 kB
Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.mp4
6.1 MB
Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.en.srt
3.4 kB
Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.mp4
6.6 MB
Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.en.srt
3.0 kB
Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.mp4
7.0 MB
Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.en.srt
6.7 kB
Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.mp4
13 MB
Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.en.srt
10 kB
Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.mp4
21 MB
Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.en.srt
2.2 kB
Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.mp4
6.5 MB
Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.en.srt
6.4 kB
Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.mp4
12 MB
Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.en.srt
12 kB
Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.mp4
34 MB
Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.en.srt
16 kB
Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.mp4
30 MB
Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.en.srt
13 kB
Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.mp4
29 MB
Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.en.srt
5.2 kB
Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.mp4
9.9 MB
Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.en.srt
10 kB
Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.mp4
31 MB
Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.en.srt
10 kB
Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.mp4
23 MB
Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.en.srt
13 kB
Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.mp4
24 MB
Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.en.srt
2.1 kB
Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.mp4
4.8 MB
Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.en.srt
8.5 kB
Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.mp4
19 MB
Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.en.srt
7.0 kB
Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.mp4
15 MB
Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).en.srt
6.3 kB
Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).mp4
12 MB
Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.en.srt
7.4 kB
Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.mp4
15 MB
Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.en.srt
4.5 kB
Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.mp4
12 MB
Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.en.srt
14 kB
Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.mp4
55 MB
Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.en.srt
11 kB
Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.mp4
25 MB
Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.en.srt
12 kB
Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.mp4
25 MB
Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.en.srt
9.1 kB
Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.mp4
16 MB
Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.en.srt
1.4 kB
Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.mp4
3.9 MB
Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.en.srt
7.3 kB
Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.mp4
15 MB
Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.en.srt
7.3 kB
Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.mp4
16 MB
Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.en.srt
8.6 kB
Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.mp4
19 MB
Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.en.srt
7.3 kB
Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.mp4
16 MB
Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.en.srt
6.5 kB
Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.mp4
13 MB
Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.en.srt
6.5 kB
Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.mp4
13 MB
Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.en.srt
7.9 kB
Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.mp4
16 MB
Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.en.srt
6.3 kB
Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.mp4
12 MB
Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.en.srt
5.2 kB
Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.mp4
9.6 MB
Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.en.srt
5.9 kB
Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.mp4
12 MB
Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.en.srt
1.3 kB
Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.mp4
2.1 MB
Chapter 7 Exam Preparation/002. Registering for the Exam.en.srt
6.0 kB
Chapter 7 Exam Preparation/002. Registering for the Exam.mp4
17 MB
Chapter 7 Exam Preparation/003. Study Strategies.en.srt
8.5 kB
Chapter 7 Exam Preparation/003. Study Strategies.mp4
28 MB
Chapter 7 Exam Preparation/004. What to do on Exam Day.en.srt
6.1 kB
Chapter 7 Exam Preparation/004. What to do on Exam Day.mp4
8.1 MB
Chapter 8 Next Steps/001. Congratulations and Next Steps.en.srt
2.4 kB
Chapter 8 Next Steps/001. Congratulations and Next Steps.mp4
8.3 MB
Chapter 1 Welcome to the Course!/001. Welcome to the Course!.en.srt
8.3 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 1 Glossary - CCNA Cybersecurity.pdf
52 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 2 Glossary - CCNA Cybersecurity.pdf
49 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 3 Glossary - CCNA Cybersecurity.pdf
40 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 4 Glossary - CCNA Cybersecurity.pdf
40 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 5 Glossary - CCNA Cybersecurity.pdf
36 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/01 - Installing and Configuring a Virtual Lab Environment.pdf
26 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/02 - Network Discovery and Host Enumeration with Nmap.pdf
36 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/03 - Packet Analysis and Protocol Identification using Wireshark.pdf
54 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/04 - Password Cracking with John the Ripper.pdf
32 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/05 - Demonstrating ARP Spoofing and Detection.pdf
37 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/06 - Identifying Malware Activity Using Wireshark.pdf
44 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/07 - Firewall Configuration and Rule Validation using UFW.pdf
22 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/08 - DNS Enumeration Techniques.pdf
22 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/09 - Simulating and Identifying Brute Force Attacks.pdf
18 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/10 - Web Application Vulnerability Scanning with Nikto.pdf
22 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/11 - Using Metasploit Framework for Exploitation Basics.pdf
36 MB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 1 Quiz - CCNA Cybersecurity.pdf
100 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 2 Quiz - CCNA Cybersecurity.pdf
95 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 3 Quiz - CCNA Cybersecurity.pdf
105 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 4 Quiz - CCNA Cybersecurity.pdf
111 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 5 Quiz - CCNA Cybersecurity.pdf
89 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #1 - CCNA Cybersecurity.pdf
276 kB
z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #2 - CCNA Cybersecurity.pdf
251 kB