Cisco Cyber Ops Associate (200201)
Focused View
13:54:47
4 View
001. Overview.mp4
08:45
002. Describe the CIA Triad.mp4
20:39
003. Describe Security Approaches.mp4
19:46
004. Describe Security Tools and Practices.mp4
19:35
005. Describe Threat Actor Types.mp4
18:59
006. Differentiate Security Concepts.mp4
18:54
007. Identify Risk Management Methods.mp4
18:14
008. Describe CVSS Terminology.mp4
18:37
009. Compare Security Deployments.mp4
19:25
010. Compare Access Control Models.mp4
21:55
011. Identify Data Visibility Challenges.mp4
17:14
012. Identify Data Loss from Traffic Profiles.mp4
21:02
013. Use 5-tuple Approach to Isolate a Host.mp4
12:46
014. Compare Detection Methodologies.mp4
18:00
001. Compare Attack Surface and Vulnerability.mp4
13:01
002. Identify tcpdump and NetFlow.mp4
17:27
003. Identify Firewall Data.mp4
16:08
004. Identify Content Filtering Data.mp4
10:35
005. Identify Application Visibility and Control Data.mp4
15:02
006. Identify Technology Impact on Data Visibility.mp4
20:33
007. Know Network Security Data Types.mp4
16:03
008. Describe Network Attacks.mp4
19:27
009. Describe Web Application Attacks.mp4
16:35
010. Describe Social Engineering Attacks.mp4
15:45
011. Describe Evasion and Obfuscation.mp4
15:28
012. Identify Certificate Components.mp4
22:06
001. Describe Endpoint-based Attacks.mp4
18:28
002. Identify Windows 10 Components.mp4
12:54
003. Identify Ubuntu Components.mp4
20:15
004. Identify Attribution in an Investigation.mp4
18:13
005. Identify Types of Evidence based on Logs.mp4
19:13
006. Compare Disk Images.mp4
15:57
007. Interpret Output from a Malware Analysis Tool.mp4
16:22
001. Categorize Intrusion Events.mp4
20:25
002. Identify Source Technology and Events.mp4
20:42
003. Compare Firewall Operations.mp4
12:26
004. Compare Traffic Analysis Techniques.mp4
18:40
005. Extract Files from a TCP Stream.mp4
14:34
006. Identify Intrusion Elements from a PCAP file.mp4
21:21
007. Interpret Artifact Elements from an Event.mp4
13:24
008. Interpret Basic Regular Expressions.mp4
17:34
001. Describe NIST SP 800-86 Concepts.mp4
18:02
002. Describe Security Management Concepts.mp4
18:46
003. Describe SOC Metrics and Scope Analysis.mp4
17:52
004. Identify Protected Data in a Network.mp4
19:26
005. Identify Network and Server Profiling Elements.mp4
19:59
006. Integrate Forensic Elements into Incident Analysis.mp4
16:42
007. Identify Elements of an IRP.mp4
11:31
More details
User Reviews
Rating
average 0
Focused display

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 48
- duration 13:54:47
- English subtitles has
- Release Date 2024/05/19