TorBT - Torrents and Magnet Links Search Engine

[ TutSala.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 4 Network Intrusion Analysis

File Name
Size
Get Bonus Downloads Here.url
177 B
~Get Your Files Here !/Bonus Resources.txt
357 B
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 00/CyOps 04-Links.pdf
84 kB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 01/Challenge Install the CyberOps WS.pdf
126 kB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 02/Challenge RegEx Tutorial.pdf
99 kB
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_4/Exercise Files/CH 03/Challenge Log File Analysis.pdf
33 kB
~Get Your Files Here !/[1] Introduction/[1] Evaluating intrusion alerts.mp4
12 MB
~Get Your Files Here !/[1] Introduction/[1] Evaluating intrusion alerts.srt
1.7 kB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.mp4
7.9 MB
~Get Your Files Here !/[1] Introduction/[2] Prepare for Cisco CBROPS exam v1.0.srt
3.6 kB
~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.mp4
2.8 MB
~Get Your Files Here !/[1] Introduction/[3] Setting up your test environment.srt
1.3 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[1] Comparing methods to examine traffic.mp4
12 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[1] Comparing methods to examine traffic.srt
4.9 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[2] Comparing IPS and IDS.mp4
8.1 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[2] Comparing IPS and IDS.srt
4.0 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[3] Recognizing alerts and events.mp4
8.1 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[3] Recognizing alerts and events.srt
3.8 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[4] Monitoring traffic.mp4
15 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[4] Monitoring traffic.srt
6.4 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[5] Interpreting IDSIPS alerts.mp4
16 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[5] Interpreting IDSIPS alerts.srt
6.0 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[6] Challenge Install the CyberOps workstation.mp4
9.4 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[6] Challenge Install the CyberOps workstation.srt
4.1 kB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[7] Solution Install the CyberOps workstation.mp4
9.4 MB
~Get Your Files Here !/[2] 1. Working with Network Security Data/[7] Solution Install the CyberOps workstation.srt
2.7 kB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[1] Being application aware.mp4
23 MB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[1] Being application aware.srt
7.8 kB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[2] Evaluating antivirus alerts.mp4
14 MB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[2] Evaluating antivirus alerts.srt
5.5 kB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[3] Viewing web proxy logs.mp4
12 MB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[3] Viewing web proxy logs.srt
5.8 kB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[4] Challenge Regular expressions.mp4
5.8 MB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[4] Challenge Regular expressions.srt
2.3 kB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[5] Solution Regular expressions.mp4
11 MB
~Get Your Files Here !/[3] 2. Evaluating Alerts and Log Files/[5] Solution Regular expressions.srt
2.4 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[1] Understanding the OSI model.mp4
9.5 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[1] Understanding the OSI model.srt
6.7 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[2] Tapping into the network.mp4
5.3 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[2] Tapping into the network.srt
2.7 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[3] Creating an Ethernet frame.mp4
4.2 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[3] Creating an Ethernet frame.srt
4.5 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[4] Identifying key elements from a pcap.mp4
15 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[4] Identifying key elements from a pcap.srt
5.7 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[5] Extracting objects from a pcap.mp4
20 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[5] Extracting objects from a pcap.srt
8.9 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[6] Challenge Log file analysis.mp4
4.6 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[6] Challenge Log file analysis.srt
1.6 kB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[7] Solution Log file analysis.mp4
11 MB
~Get Your Files Here !/[4] 3. Using Wireshark to Evaluate Traffic/[7] Solution Log file analysis.srt
7.0 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[1] Understanding TCP.mp4
27 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[1] Understanding TCP.srt
12 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[2] Moving through the TCP handshake and teardown.mp4
26 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[2] Moving through the TCP handshake and teardown.srt
11 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[3] Recognizing User Datagram Protocol.mp4
21 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[3] Recognizing User Datagram Protocol.srt
8.3 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[4] Viewing IPv4.mp4
14 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[4] Viewing IPv4.srt
6.8 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[5] Investigating IPv6.mp4
11 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[5] Investigating IPv6.srt
5.4 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[6] Grasping ICMP.mp4
16 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[6] Grasping ICMP.srt
8.3 kB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[7] Discovering ICMPv6.mp4
16 MB
~Get Your Files Here !/[5] 4. Diving into TCPIP Headers/[7] Discovering ICMPv6.srt
6.2 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[1] Analyzing HTTP.mp4
18 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[1] Analyzing HTTP.srt
5.6 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[2] Dissecting DNS.mp4
18 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[2] Dissecting DNS.srt
6.0 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[3] Using ARP.mp4
12 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[3] Using ARP.srt
4.5 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[4] Outlining email threats.mp4
8.8 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[4] Outlining email threats.srt
3.9 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[5] Detecting malware by examining artifacts.mp4
18 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[5] Detecting malware by examining artifacts.srt
6.4 kB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[6] Confirming malware by examining artifacts.mp4
16 MB
~Get Your Files Here !/[6] 5. Visualizing Application Data/[6] Confirming malware by examining artifacts.srt
5.6 kB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.mp4
3.8 MB
~Get Your Files Here !/[7] Conclusion/[1] Next steps.srt
2.2 kB