zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
05. Cisco CyberOps Managing Policies and Procedures
magnet:?xt=urn:btih:9234509ff6f8a3fbb74b9e4d836ff4ac7f8b6b47&dn=05. Cisco CyberOps Managing Policies and Procedures
磁力链接详情
Hash值:
9234509ff6f8a3fbb74b9e4d836ff4ac7f8b6b47
点击数:
169
文件大小:
262.1 MB
文件数量:
24
创建日期:
2022-8-10 03:08
最后访问:
2024-10-29 17:03
访问标签:
05
Cisco
CyberOps
Managing
Policies
and
Procedures
文件列表详情
01. Course Overview/01. Course Overview.mp4 3.15 MB
02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp4 8.78 MB
02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp4 9.7 MB
02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp4 4.16 MB
02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp4 15.06 MB
03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp4 9.13 MB
03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp4 5.62 MB
03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp4 22.2 MB
03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp4 11.83 MB
03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp4 19.33 MB
03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp4 6.11 MB
03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp4 13.61 MB
03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp4 13 MB
03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp4 4.65 MB
04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp4 6.83 MB
04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp4 9.25 MB
04. Applying the Incident Response Process/03. The Incident Response Steps.mp4 11.14 MB
04. Applying the Incident Response Process/04. The IR Team.mp4 7.22 MB
04. Applying the Incident Response Process/05. Incident Response in the Lab.mp4 28.66 MB
04. Applying the Incident Response Process/06. Collecting Evidence.mp4 3.94 MB
05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp4 8.11 MB
05. Classifying Intrusion Events/02. Mapping Events to the Models.mp4 8.36 MB
05. Classifying Intrusion Events/03. Practicing Event Mapping.mp4 25.49 MB
05. Classifying Intrusion Events/04. Putting It All together.mp4 6.79 MB
其他位置