Companies Home Search Profile

Cisco Cyber Ops Associate (200201)

Focused View

13:54:47

4 View
  • 001. Overview.mp4
    08:45
  • 002. Describe the CIA Triad.mp4
    20:39
  • 003. Describe Security Approaches.mp4
    19:46
  • 004. Describe Security Tools and Practices.mp4
    19:35
  • 005. Describe Threat Actor Types.mp4
    18:59
  • 006. Differentiate Security Concepts.mp4
    18:54
  • 007. Identify Risk Management Methods.mp4
    18:14
  • 008. Describe CVSS Terminology.mp4
    18:37
  • 009. Compare Security Deployments.mp4
    19:25
  • 010. Compare Access Control Models.mp4
    21:55
  • 011. Identify Data Visibility Challenges.mp4
    17:14
  • 012. Identify Data Loss from Traffic Profiles.mp4
    21:02
  • 013. Use 5-tuple Approach to Isolate a Host.mp4
    12:46
  • 014. Compare Detection Methodologies.mp4
    18:00
  • 001. Compare Attack Surface and Vulnerability.mp4
    13:01
  • 002. Identify tcpdump and NetFlow.mp4
    17:27
  • 003. Identify Firewall Data.mp4
    16:08
  • 004. Identify Content Filtering Data.mp4
    10:35
  • 005. Identify Application Visibility and Control Data.mp4
    15:02
  • 006. Identify Technology Impact on Data Visibility.mp4
    20:33
  • 007. Know Network Security Data Types.mp4
    16:03
  • 008. Describe Network Attacks.mp4
    19:27
  • 009. Describe Web Application Attacks.mp4
    16:35
  • 010. Describe Social Engineering Attacks.mp4
    15:45
  • 011. Describe Evasion and Obfuscation.mp4
    15:28
  • 012. Identify Certificate Components.mp4
    22:06
  • 001. Describe Endpoint-based Attacks.mp4
    18:28
  • 002. Identify Windows 10 Components.mp4
    12:54
  • 003. Identify Ubuntu Components.mp4
    20:15
  • 004. Identify Attribution in an Investigation.mp4
    18:13
  • 005. Identify Types of Evidence based on Logs.mp4
    19:13
  • 006. Compare Disk Images.mp4
    15:57
  • 007. Interpret Output from a Malware Analysis Tool.mp4
    16:22
  • 001. Categorize Intrusion Events.mp4
    20:25
  • 002. Identify Source Technology and Events.mp4
    20:42
  • 003. Compare Firewall Operations.mp4
    12:26
  • 004. Compare Traffic Analysis Techniques.mp4
    18:40
  • 005. Extract Files from a TCP Stream.mp4
    14:34
  • 006. Identify Intrusion Elements from a PCAP file.mp4
    21:21
  • 007. Interpret Artifact Elements from an Event.mp4
    13:24
  • 008. Interpret Basic Regular Expressions.mp4
    17:34
  • 001. Describe NIST SP 800-86 Concepts.mp4
    18:02
  • 002. Describe Security Management Concepts.mp4
    18:46
  • 003. Describe SOC Metrics and Scope Analysis.mp4
    17:52
  • 004. Identify Protected Data in a Network.mp4
    19:26
  • 005. Identify Network and Server Profiling Elements.mp4
    19:59
  • 006. Integrate Forensic Elements into Incident Analysis.mp4
    16:42
  • 007. Identify Elements of an IRP.mp4
    11:31
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 48
    • duration 13:54:47
    • English subtitles has
    • Release Date 2024/05/19

    Courses related to Cisco CCNA

    Courses related to Cisco

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Cisco CCNP

    Subtitle
    Secure Architecture Design
    INESecure Architecture Design
    3:40:57
    English subtitles
    08/12/2023