TorBT - Torrents and Magnet Links Search Engine

[ CourseMega.com ] Linkedin - Cisco Certified CyberOps Associate Cert Prep - 5 Security Policies and Procedures

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1. Introduction/01. Protecting the data.en.srt
1.7 kB
~Get Your Files Here !/1. Introduction/01. Protecting the data.mp4
10 MB
~Get Your Files Here !/1. Introduction/02. Prepare for Cisco CBROPS exam v1.0.en.srt
1.3 kB
~Get Your Files Here !/1. Introduction/02. Prepare for Cisco CBROPS exam v1.0.mp4
5.2 MB
~Get Your Files Here !/1. Introduction/03. Setting up your test environment.en.srt
3.5 kB
~Get Your Files Here !/1. Introduction/03. Setting up your test environment.mp4
13 MB
~Get Your Files Here !/2. Securing Organizational Assets/010. Challenge Create a security policy.en.srt
1.1 kB
~Get Your Files Here !/2. Securing Organizational Assets/010. Challenge Create a security policy.mp4
7.3 MB
~Get Your Files Here !/2. Securing Organizational Assets/011. Solution Create a security policy.en.srt
5.0 kB
~Get Your Files Here !/2. Securing Organizational Assets/011. Solution Create a security policy.mp4
28 MB
~Get Your Files Here !/2. Securing Organizational Assets/04. Summarizing risk management.en.srt
5.1 kB
~Get Your Files Here !/2. Securing Organizational Assets/04. Summarizing risk management.mp4
30 MB
~Get Your Files Here !/2. Securing Organizational Assets/05. Protecting assets.en.srt
5.6 kB
~Get Your Files Here !/2. Securing Organizational Assets/05. Protecting assets.mp4
33 MB
~Get Your Files Here !/2. Securing Organizational Assets/06. Reviewing configuration management.en.srt
4.2 kB
~Get Your Files Here !/2. Securing Organizational Assets/06. Reviewing configuration management.mp4
24 MB
~Get Your Files Here !/2. Securing Organizational Assets/07. Outlining mobile device management.en.srt
5.8 kB
~Get Your Files Here !/2. Securing Organizational Assets/07. Outlining mobile device management.mp4
33 MB
~Get Your Files Here !/2. Securing Organizational Assets/08. Updating and patching organizational assets.en.srt
3.6 kB
~Get Your Files Here !/2. Securing Organizational Assets/08. Updating and patching organizational assets.mp4
21 MB
~Get Your Files Here !/2. Securing Organizational Assets/09. Creating security policies.en.srt
3.4 kB
~Get Your Files Here !/2. Securing Organizational Assets/09. Creating security policies.mp4
24 MB
~Get Your Files Here !/3. Handling Incidents/012. Understanding incidents.en.srt
4.3 kB
~Get Your Files Here !/3. Handling Incidents/012. Understanding incidents.mp4
25 MB
~Get Your Files Here !/3. Handling Incidents/013. Preparing for an incident.en.srt
4.5 kB
~Get Your Files Here !/3. Handling Incidents/013. Preparing for an incident.mp4
25 MB
~Get Your Files Here !/3. Handling Incidents/014. Detecting incidents.en.srt
5.6 kB
~Get Your Files Here !/3. Handling Incidents/014. Detecting incidents.mp4
34 MB
~Get Your Files Here !/3. Handling Incidents/015. Managing incidents.en.srt
5.7 kB
~Get Your Files Here !/3. Handling Incidents/015. Managing incidents.mp4
34 MB
~Get Your Files Here !/3. Handling Incidents/016. Collecting evidence.en.srt
5.4 kB
~Get Your Files Here !/3. Handling Incidents/016. Collecting evidence.mp4
32 MB
~Get Your Files Here !/3. Handling Incidents/017. Closing an incident.en.srt
3.8 kB
~Get Your Files Here !/3. Handling Incidents/017. Closing an incident.mp4
23 MB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/018. Understanding network profiling.en.srt
6.3 kB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/018. Understanding network profiling.mp4
39 MB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/019. Profiling server behavior.en.srt
5.4 kB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/019. Profiling server behavior.mp4
32 MB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/020. Challenge Examine suspect IP addresses.en.srt
1.7 kB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/020. Challenge Examine suspect IP addresses.mp4
11 MB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/021. Solution Examine suspect IP addresses.en.srt
5.3 kB
~Get Your Files Here !/4. Identifying Endpoint Vulnerabilities/021. Solution Examine suspect IP addresses.mp4
32 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/022. Identifying protected data.en.srt
3.5 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/022. Identifying protected data.mp4
21 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/023. Outlining the Cyber Kill Chain Model.en.srt
5.4 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/023. Outlining the Cyber Kill Chain Model.mp4
32 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/024. Pivoting through the Diamond Model of Intrusion.en.srt
5.2 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/024. Pivoting through the Diamond Model of Intrusion.mp4
33 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/025. Evaluating SOC key performance indicators.en.srt
3.4 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/025. Evaluating SOC key performance indicators.mp4
22 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/026. Challenge The Cyber Kill Chain.en.srt
1.3 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/026. Challenge The Cyber Kill Chain.mp4
7.8 MB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/027. Solution The Cyber Kill Chain.en.srt
3.4 kB
~Get Your Files Here !/5. Limiting the Effects of Intrusions/027. Solution The Cyber Kill Chain.mp4
23 MB
~Get Your Files Here !/6. Conclusion/028. Next steps.en.srt
1.7 kB
~Get Your Files Here !/6. Conclusion/028. Next steps.mp4
9.4 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_Cisco_Cert_CyberOps_Associate_Cert_Prep_5/Exercise Files/CyOps 05-Links.pdf
75 kB