Companies Home Search Profile

Cisco Cyber Ops Associate (200201)

Focused View

13:54:47

4 View
  • 001. Overview.mp4
    08:45
  • 002. Describe the CIA Triad.mp4
    20:39
  • 003. Describe Security Approaches.mp4
    19:46
  • 004. Describe Security Tools and Practices.mp4
    19:35
  • 005. Describe Threat Actor Types.mp4
    18:59
  • 006. Differentiate Security Concepts.mp4
    18:54
  • 007. Identify Risk Management Methods.mp4
    18:14
  • 008. Describe CVSS Terminology.mp4
    18:37
  • 009. Compare Security Deployments.mp4
    19:25
  • 010. Compare Access Control Models.mp4
    21:55
  • 011. Identify Data Visibility Challenges.mp4
    17:14
  • 012. Identify Data Loss from Traffic Profiles.mp4
    21:02
  • 013. Use 5-tuple Approach to Isolate a Host.mp4
    12:46
  • 014. Compare Detection Methodologies.mp4
    18:00
  • 001. Compare Attack Surface and Vulnerability.mp4
    13:01
  • 002. Identify tcpdump and NetFlow.mp4
    17:27
  • 003. Identify Firewall Data.mp4
    16:08
  • 004. Identify Content Filtering Data.mp4
    10:35
  • 005. Identify Application Visibility and Control Data.mp4
    15:02
  • 006. Identify Technology Impact on Data Visibility.mp4
    20:33
  • 007. Know Network Security Data Types.mp4
    16:03
  • 008. Describe Network Attacks.mp4
    19:27
  • 009. Describe Web Application Attacks.mp4
    16:35
  • 010. Describe Social Engineering Attacks.mp4
    15:45
  • 011. Describe Evasion and Obfuscation.mp4
    15:28
  • 012. Identify Certificate Components.mp4
    22:06
  • 001. Describe Endpoint-based Attacks.mp4
    18:28
  • 002. Identify Windows 10 Components.mp4
    12:54
  • 003. Identify Ubuntu Components.mp4
    20:15
  • 004. Identify Attribution in an Investigation.mp4
    18:13
  • 005. Identify Types of Evidence based on Logs.mp4
    19:13
  • 006. Compare Disk Images.mp4
    15:57
  • 007. Interpret Output from a Malware Analysis Tool.mp4
    16:22
  • 001. Categorize Intrusion Events.mp4
    20:25
  • 002. Identify Source Technology and Events.mp4
    20:42
  • 003. Compare Firewall Operations.mp4
    12:26
  • 004. Compare Traffic Analysis Techniques.mp4
    18:40
  • 005. Extract Files from a TCP Stream.mp4
    14:34
  • 006. Identify Intrusion Elements from a PCAP file.mp4
    21:21
  • 007. Interpret Artifact Elements from an Event.mp4
    13:24
  • 008. Interpret Basic Regular Expressions.mp4
    17:34
  • 001. Describe NIST SP 800-86 Concepts.mp4
    18:02
  • 002. Describe Security Management Concepts.mp4
    18:46
  • 003. Describe SOC Metrics and Scope Analysis.mp4
    17:52
  • 004. Identify Protected Data in a Network.mp4
    19:26
  • 005. Identify Network and Server Profiling Elements.mp4
    19:59
  • 006. Integrate Forensic Elements into Incident Analysis.mp4
    16:42
  • 007. Identify Elements of an IRP.mp4
    11:31
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 48
    • duration 13:54:47
    • English subtitles has
    • Release Date 2024/05/19