种子简介
种子名称:
01. Cisco CyberOps Exploring Security Concepts
文件类型:
视频
文件数目:
24个文件
文件大小:
180.36 MB
收录时间:
2022-9-5 08:06
已经下载:
3次
资源热度:
176
最近下载:
2024-12-20 06:14
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:13497e4d1ee25fe967306d8d50f3c86c743cdc22&dn=01. Cisco CyberOps Exploring Security Concepts
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
01. Cisco CyberOps Exploring Security Concepts.torrent
01. Course Overview/01. Course Overview.mp43.58MB
02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp44.49MB
02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp411.38MB
02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp48.9MB
02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp410.16MB
02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp45.36MB
02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp45.25MB
02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp49.58MB
02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp42.14MB
03. Identifying Common Cybersecurity Concepts/01. Introduction.mp42.28MB
03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp47.53MB
03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp49.17MB
03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp47.23MB
03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp49.07MB
03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp49.06MB
03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp46.34MB
04. Explaining Cybersecurity Challenges/01. Introduction.mp44.73MB
04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp412.24MB
04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp410.67MB
04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp43.34MB
04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp48.24MB
04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp44.27MB
04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp422.1MB
04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp43.24MB