Course Cisco CyberOps Associate (200-201)
Focused View
13:54:47
8 View
1-Overview.mp4
08:45
2-Describe the CIA Triad.mp4
20:39
3-Describe Security Approaches.mp4
19:46
4-Describe Security Tools and Practices.mp4
19:35
5-Describe Threat Actor Types.mp4
18:59
6-Differentiate Security Concepts.mp4
18:54
7-Identify Risk Management Methods.mp4
18:14
8-Describe CVSS Terminology.mp4
18:37
9-Compare Security Deployments.mp4
19:25
10-Compare Access Control Models.mp4
21:55
11-Identify Data Visibility Challenges.mp4
17:14
12-Identify Data Loss from Traffic Profiles.mp4
21:02
13-Use 5-tuple Approach to Isolate a Host.mp4
12:46
14-Compare Detection Methodologies.mp4
18:00
15-Compare Attack Surface and Vulnerability.mp4
13:01
16-Identify tcpdump and NetFlow.mp4
17:27
17-Identify Firewall Data.mp4
16:08
18-Identify Content Filtering Data.mp4
10:35
19-Identify Application Visibility and Control Data.mp4
15:02
20-Identify Technology Impact on Data Visibility.mp4
20:33
21-Know Network Security Data Types.mp4
16:03
22-Describe Network Attacks.mp4
19:27
23-Describe Web Application Attacks.mp4
16:35
24-Describe Social Engineering Attacks.mp4
15:45
25-Describe Evasion and Obfuscation.mp4
15:28
26-Identify Certificate Components.mp4
22:06
27-Describe Endpoint-based Attacks.mp4
18:28
28-Identify Windows 10 Components.mp4
12:54
29-Identify Ubuntu Components.mp4
20:15
30-Identify Attribution in an Investigation.mp4
18:13
31-Identify Types of Evidence based on Logs.mp4
19:13
32-Compare Disk Images.mp4
15:57
33-Interpret Output from a Malware Analysis Tool.mp4
16:22
34-Categorize Intrusion Events.mp4
20:25
35-Identify Source Technology and Events.mp4
20:42
36-Compare Firewall Operations.mp4
12:26
37-Compare Traffic Analysis Techniques.mp4
18:40
38-Extract Files from a TCP Stream.mp4
14:34
39-Identify Intrusion Elements from a PCAP file.mp4
21:21
40-Interpret Artifact Elements from an Event.mp4
13:24
41-Interpret Basic Regular Expressions.mp4
17:34
42-Describe NIST SP 800-86 Concepts.mp4
18:02
43-Describe Security Management Concepts.mp4
18:46
44-Describe SOC Metrics and Scope Analysis.mp4
17:52
45-Identify Protected Data in a Network.mp4
19:26
46-Identify Network and Server Profiling Elements.mp4
19:59
47-Integrate Forensic Elements into Incident Analysis.mp4
16:42
48-Identify Elements of an IRP.mp4
11:31
More details
User Reviews
Rating
average 0
Focused display

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 48
- duration 13:54:47
- Release Date 2024/04/26