Magnetic link has been copied to the cutting board

Name 05. Cisco CyberOps Managing Policies and Procedures

File Type video

Size 271.87MB

UpdateDate 2024-9-9

hash *****09FF6F8A3FBB74B9E4D836FF4AC7F8B6B4

Hot 1

Files 01. Course Overview/01. Course Overview.mp4 | 3.15MB 01. Course Overview/01. Course Overview.srt | 2.28KB 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4 | 8.78MB 02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.srt | 7.18KB 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4 | 9.70MB 02. Understanding Cyber Management Concepts/02. Describing Management Concepts.srt | 8.74KB 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4 | 4.16MB 02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.srt | 4.68KB 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4 | 15.06MB 02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.srt | 9.38KB 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4 | 9.13MB 03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.srt | 7.29KB 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4 | 5.62MB 03. Identifying Assets and Critical Data/02. Learning About Server Profiling.srt | 6.22KB 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4 | 22.20MB 03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.srt | 7.42KB 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4 | 11.83MB 03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.srt | 6.55KB 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4 | 19.33MB 03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.srt | 7.41KB 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4 | 6.11MB 03. Identifying Assets and Critical Data/06. Learning About Network Profiling.srt | 4.64KB 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4 | 13.61MB 03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.srt | 6.08KB 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4 | 13.00MB 03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.srt | 7.17KB 03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4 | 4.65MB 03. Identifying Assets and Critical Data/09. Protecting Critical Data.srt | 4.36KB 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4 | 6.83MB 04. Applying the Incident Response Process/01. Learning About the Incident Response Process.srt | 5.28KB 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4 | 9.25MB 04. Applying the Incident Response Process/02. Creating an Incident Response Plan.srt | 9.27KB 04. Applying the Incident Response Process/03. The Incident Response Steps.mp4 | 11.14MB 04. Applying the Incident Response Process/03. The Incident Response Steps.srt | 10.41KB 04. Applying the Incident Response Process/04. The IR Team.mp4 | 7.22MB 04. Applying the Incident Response Process/04. The IR Team.srt | 7.52KB 04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4 | 28.66MB 04. Applying the Incident Response Process/05. Incident Response in the Lab.srt | 10.20KB 04. Applying the Incident Response Process/06. Collecting Evidence.mp4 | 3.94MB 04. Applying the Incident Response Process/06. Collecting Evidence.srt | 4.36KB 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4 | 8.11MB 05. Classifying Intrusion Events/01. Understanding Frameworks and Models.srt | 6.87KB 05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4 | 8.36MB 05. Classifying Intrusion Events/02. Mapping Events to the Models.srt | 7.64KB 05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4 | 25.49MB 05. Classifying Intrusion Events/03. Practicing Event Mapping.srt | 8.94KB 05. Classifying Intrusion Events/04. Putting It All together.mp4 | 6.79MB 05. Classifying Intrusion Events/04. Putting It All together.srt | 5.28KB Exercise.zip | 9.61MB

Recommend

Magnetic link has been copied to the cutting board