Companies Home Search Profile

Course Cisco CyberOps Associate (200-201)

Focused View

13:54:47

8 View
  • 1-Overview.mp4
    08:45
  • 2-Describe the CIA Triad.mp4
    20:39
  • 3-Describe Security Approaches.mp4
    19:46
  • 4-Describe Security Tools and Practices.mp4
    19:35
  • 5-Describe Threat Actor Types.mp4
    18:59
  • 6-Differentiate Security Concepts.mp4
    18:54
  • 7-Identify Risk Management Methods.mp4
    18:14
  • 8-Describe CVSS Terminology.mp4
    18:37
  • 9-Compare Security Deployments.mp4
    19:25
  • 10-Compare Access Control Models.mp4
    21:55
  • 11-Identify Data Visibility Challenges.mp4
    17:14
  • 12-Identify Data Loss from Traffic Profiles.mp4
    21:02
  • 13-Use 5-tuple Approach to Isolate a Host.mp4
    12:46
  • 14-Compare Detection Methodologies.mp4
    18:00
  • 15-Compare Attack Surface and Vulnerability.mp4
    13:01
  • 16-Identify tcpdump and NetFlow.mp4
    17:27
  • 17-Identify Firewall Data.mp4
    16:08
  • 18-Identify Content Filtering Data.mp4
    10:35
  • 19-Identify Application Visibility and Control Data.mp4
    15:02
  • 20-Identify Technology Impact on Data Visibility.mp4
    20:33
  • 21-Know Network Security Data Types.mp4
    16:03
  • 22-Describe Network Attacks.mp4
    19:27
  • 23-Describe Web Application Attacks.mp4
    16:35
  • 24-Describe Social Engineering Attacks.mp4
    15:45
  • 25-Describe Evasion and Obfuscation.mp4
    15:28
  • 26-Identify Certificate Components.mp4
    22:06
  • 27-Describe Endpoint-based Attacks.mp4
    18:28
  • 28-Identify Windows 10 Components.mp4
    12:54
  • 29-Identify Ubuntu Components.mp4
    20:15
  • 30-Identify Attribution in an Investigation.mp4
    18:13
  • 31-Identify Types of Evidence based on Logs.mp4
    19:13
  • 32-Compare Disk Images.mp4
    15:57
  • 33-Interpret Output from a Malware Analysis Tool.mp4
    16:22
  • 34-Categorize Intrusion Events.mp4
    20:25
  • 35-Identify Source Technology and Events.mp4
    20:42
  • 36-Compare Firewall Operations.mp4
    12:26
  • 37-Compare Traffic Analysis Techniques.mp4
    18:40
  • 38-Extract Files from a TCP Stream.mp4
    14:34
  • 39-Identify Intrusion Elements from a PCAP file.mp4
    21:21
  • 40-Interpret Artifact Elements from an Event.mp4
    13:24
  • 41-Interpret Basic Regular Expressions.mp4
    17:34
  • 42-Describe NIST SP 800-86 Concepts.mp4
    18:02
  • 43-Describe Security Management Concepts.mp4
    18:46
  • 44-Describe SOC Metrics and Scope Analysis.mp4
    17:52
  • 45-Identify Protected Data in a Network.mp4
    19:26
  • 46-Identify Network and Server Profiling Elements.mp4
    19:59
  • 47-Integrate Forensic Elements into Incident Analysis.mp4
    16:42
  • 48-Identify Elements of an IRP.mp4
    11:31
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 48
    • duration 13:54:47
    • Release Date 2024/04/26