zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
01. Cisco CyberOps Exploring Security Concepts
magnet:?xt=urn:btih:13497e4d1ee25fe967306d8d50f3c86c743cdc22&dn=01. Cisco CyberOps Exploring Security Concepts
磁力链接详情
Hash值:
13497e4d1ee25fe967306d8d50f3c86c743cdc22
点击数:
183
文件大小:
180.36 MB
文件数量:
24
创建日期:
2022-9-5 08:06
最后访问:
2024-12-31 11:10
访问标签:
01
Cisco
CyberOps
Exploring
Security
Concepts
文件列表详情
01. Course Overview/01. Course Overview.mp4 3.58 MB
02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4.49 MB
02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11.38 MB
02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 8.9 MB
02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10.16 MB
02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5.36 MB
02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5.25 MB
02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 9.58 MB
02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2.14 MB
03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2.28 MB
03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 7.53 MB
03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9.17 MB
03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7.23 MB
03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9.07 MB
03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9.06 MB
03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6.34 MB
04. Explaining Cybersecurity Challenges/01. Introduction.mp4 4.73 MB
04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12.24 MB
04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 10.67 MB
04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3.34 MB
04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8.24 MB
04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4.27 MB
04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22.1 MB
04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3.24 MB
其他位置