RAR-files |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.rar |
50,000,000 |
913BA9AE |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r00 |
50,000,000 |
D4061088 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r01 |
50,000,000 |
BE83D72E |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r02 |
50,000,000 |
51B10913 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r03 |
50,000,000 |
B34D66DA |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r04 |
50,000,000 |
29569A03 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r05 |
50,000,000 |
1DFF5892 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r06 |
50,000,000 |
C89D4732 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r07 |
50,000,000 |
70B4C22A |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r08 |
50,000,000 |
DDFFA1D3 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r09 |
35,456,774 |
79FC044A |
|
Total size: |
535,456,774 |
|
|
Archived
files |
01.01-defending_the_network.mkv
[ae98bc8a8c7289f0]
|
7,124,447 |
C30C4176 |
01.02-prepare_for_cisco_cbrops_exam.mkv
[bf17ec7cf802c2a4]
|
3,025,128 |
850D8833 |
01.03-setting_up_your_test_environment.mkv
[feae49e5b09244f3]
|
7,116,180 |
5BD47FF3 |
02.01-recognizing_todays_threats.mkv
[bc6d03e4b465ef2]
|
2,529,656 |
9F42066D |
02.02-understanding_the_threat_actor.mkv
[154c48f5f0a7df49]
|
10,752,339 |
C2DAFE4D |
02.03-outlining_the_cia_triad.mkv
[313cd7b075ea888f]
|
19,202,405 |
EBFDE728 |
02.04-having_zero_trust.mkv
[63b29020db5a1c71]
|
10,989,560 |
897F118C |
02.05-exploring_risk.mkv
[649d3bb1d04a8eda]
|
7,455,126 |
17385BA1 |
02.06-analyzing_risk.mkv
[7efe1e2742d330e]
|
10,691,493 |
D93F2D6A |
02.07-challenge_overview_of_malware.mkv
[c78b16b596af0d10]
|
5,628,497 |
D0D0CAAD |
02.08-solution_overview_of_malware.mkv
[b90dcaf450848f92]
|
16,210,355 |
E28FDB75 |
03.01-using_the_cvss.mkv
[1cc4b9a9ea875034]
|
14,901,289 |
16DE825D |
03.02-interpreting_cvss_metric_groups.mkv
[bba8a4508d06f02a]
|
12,533,477 |
7AB3C764 |
03.03-understanding_the_cve_and_the_nvd.mkv
[94bd2db067ae8f13]
|
16,380,151 |
4FF79E5E |
03.04-challenge_temporal_metric_group.mkv
[66cf8f341d07608]
|
6,763,450 |
1C27FB38 |
03.05-solution_temporal_metric_group.mkv
[4c2bb742ef73c046]
|
11,239,723 |
8058A80B |
04.01-using_the_principle_of_least_privilege.mkv
[f68cc861c8324302]
|
11,878,019 |
3D9E7D7F |
04.02-defining_access_control.mkv
[ddc74eedee61f6e2]
|
13,660,230 |
D452CD4E |
04.03-comparing_access_control_models.mkv
[a0d7e8831ded9c49]
|
16,379,727 |
91C74D5A |
04.04-summarizing_triple-a_security.mkv
[a569af950b225441]
|
10,329,058 |
C84C6D52 |
04.05-verifying_authentication.mkv
[365f54aef713e587]
|
10,318,846 |
AD4E3F38 |
04.06-granting_authorization.mkv
[1bd456cdcd75ddf]
|
9,098,961 |
765BEB57 |
04.07-accounting_and_logging_activity.mkv
[e2c1927619a90dc]
|
9,739,755 |
5FFAD423 |
04.08-challenge_network_diagram.mkv
[b280ec9c004797d8]
|
5,317,438 |
EF47A15D |
04.09-solution_network_diagram.mkv
[1b19873d50e54566]
|
17,211,626 |
AB694949 |
05.01-recognizing_the_complexity_of_todays_environment.mkv
[260172d62d5a6b48]
|
10,641,639 |
5860B9EA |
05.02-leveraging_threat_intelligence.mkv
[9ab86a184cd0d469]
|
20,484,744 |
0374F40C |
05.03-hunting_threats.mkv
[bb7a4eb1a02c0f22]
|
14,928,275 |
C6340808 |
05.04-analyzing_malware.mkv
[5ba40a82f96d3252]
|
9,253,989 |
32E90730 |
05.05-dissecting_malware_using_reverse_engineering.mkv
[773e71fc17dc5c75]
|
35,985,217 |
6D1A1D2B |
05.06-detecting_anomalies_using_the_sliding_window.mkv
[8e1d8c65d04adde5]
|
18,197,441 |
B7F491F3 |
05.07-comparing_detection_methods.mkv
[b7e8c10e9223a5a3]
|
16,315,314 |
165FAFB6 |
05.08-using_five-tuple_log_analysis.mkv
[f5cb7994758abfe6]
|
20,450,103 |
42ECABA2 |
05.09-monitoring_data_loss_using_traffic_profiles.mkv
[1bef24cefdbbe9bd]
|
16,835,101 |
245EF938 |
06.01-identifying_challenges_of_data_visibility.mkv
[14c6fc0c860e6088]
|
8,765,456 |
795034C2 |
06.02-comparing_security_deployments.mkv
[67327015cccc4829]
|
11,074,870 |
D8F82C7A |
06.03-using_agentless_or_agent-based_methods.mkv
[de8410209677489d]
|
9,028,370 |
28C21FFB |
06.04-utilizing_siem_soar_and_log_management.mkv
[2a893d6af1df68ab]
|
12,562,475 |
0B200FDA |
06.05-employing_runbook_automation.mkv
[ebd1b91523183b65]
|
14,549,942 |
6CFDD310 |
06.06-exploring_nmap.mkv
[bba961a08a31f1b5]
|
17,816,058 |
C902B60C |
06.07-challenge_using_nmap.mkv
[dee74a3d0191711b]
|
11,305,531 |
E6D8DCEA |
06.08-solution_using_nmap.mkv
[a6070ebc013d1d8d]
|
17,152,613 |
115F202D |
07.01-next_steps.mkv
[c3f4b894c45774d5]
|
3,433,878 |
CE293C5C |
Ex_Files_CyberOps.zip |
194,378 |
6FEB67C5 |
|
Total size: |
535,452,330 |
|
|