种子简介
种子名称:
05. Cisco CyberOps Managing Policies and Procedures
文件类型:
视频
文件数目:
24个文件
文件大小:
262.1 MB
收录时间:
2022-8-10 03:08
已经下载:
3次
资源热度:
190
最近下载:
2024-12-29 20:31
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:9234509ff6f8a3fbb74b9e4d836ff4ac7f8b6b47&dn=05. Cisco CyberOps Managing Policies and Procedures
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
05. Cisco CyberOps Managing Policies and Procedures.torrent
01. Course Overview/01. Course Overview.mp43.15MB
02. Understanding Cyber Management Concepts/01. Understanding the Cyber Management Problem.mp48.78MB
02. Understanding Cyber Management Concepts/02. Describing Management Concepts.mp49.7MB
02. Understanding Cyber Management Concepts/03. Learning About SOC Metrics.mp44.16MB
02. Understanding Cyber Management Concepts/04. SOC Metric Management in Splunk Enterprise Security.mp415.06MB
03. Identifying Assets and Critical Data/01. Digging Deeper into Assets.mp49.13MB
03. Identifying Assets and Critical Data/02. Learning About Server Profiling.mp45.62MB
03. Identifying Assets and Critical Data/03. Practicing Server Profiling on Linux.mp422.2MB
03. Identifying Assets and Critical Data/04. Practicing Server Profiling on Windows.mp411.83MB
03. Identifying Assets and Critical Data/05. Practicing Server Profiling with NMAP.mp419.33MB
03. Identifying Assets and Critical Data/06. Learning About Network Profiling.mp46.11MB
03. Identifying Assets and Critical Data/07. Practicing Network Profiling with pfsense.mp413.61MB
03. Identifying Assets and Critical Data/08. Practicing Network Profiling with Splunk Stream.mp413MB
03. Identifying Assets and Critical Data/09. Protecting Critical Data.mp44.65MB
04. Applying the Incident Response Process/01. Learning About the Incident Response Process.mp46.83MB
04. Applying the Incident Response Process/02. Creating an Incident Response Plan.mp49.25MB
04. Applying the Incident Response Process/03. The Incident Response Steps.mp411.14MB
04. Applying the Incident Response Process/04. The IR Team.mp47.22MB
04. Applying the Incident Response Process/05. Incident Response in the Lab.mp428.66MB
04. Applying the Incident Response Process/06. Collecting Evidence.mp43.94MB
05. Classifying Intrusion Events/01. Understanding Frameworks and Models.mp48.11MB
05. Classifying Intrusion Events/02. Mapping Events to the Models.mp48.36MB
05. Classifying Intrusion Events/03. Practicing Event Mapping.mp425.49MB
05. Classifying Intrusion Events/04. Putting It All together.mp46.79MB