FileMood

Download CBTN17

CBTN17

Name

CBTN17

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.6 GB

Total Files

125

Hash

6079BEB9E378CB36DFEA17D3B1D03237B188ABFE

/1 - Cisco Certified CyberOps Associate 210-250 SECFND/

1 - Intro to 210-250: Cybersecurity Fundamentals.mp4

15.8 MB

10 - Network Concepts: TCP's Three-Way Handshake.mp4

24.4 MB

11 - Network Concepts: Wireshark Verification of a TCP Three-Way Handshake.mp4

21.4 MB

12 - Network Concepts: Properties of Network Traffic.mp4

25.2 MB

13 - Network Concepts: Layer 2 Ethernet Addresses.mp4

20.7 MB

14 - Network Concepts: How a Layer 2 Switch Works.mp4

24.0 MB

15 - Network Concepts: Demonstration of Switch Dynamic Learning.mp4

13.8 MB

16 - Network Concepts: Understanding VLANs.mp4

14.4 MB

17 - Network Concepts: Implementing a VLAN.mp4

25.3 MB

18 - Network Concepts: Overview of 802.1Q and Trunks.mp4

25.0 MB

19 - Network Concepts: Configuring an 802.1Q Ethernet Trunk.mp4

23.5 MB

2 - Network Concepts: A Tale of Two Kings.mp4

22.0 MB

20 - Network Concepts: Switch Port Mirroring.mp4

12.8 MB

21 - Network Concepts: L3 Routing.mp4

25.0 MB

22 - Network Concepts: IPv4 Overview.mp4

23.8 MB

23 - Network Concepts: IPv4 Binary Basics.mp4

24.5 MB

24 - Network Concepts: IPv4 Converting Decimal to Binary.mp4

23.4 MB

25 - Network Concepts: IPv4 Converting Binary to Decimal.mp4

24.5 MB

26 - Network Concepts: The IPv4 Mask.mp4

23.7 MB

27 - Network Concepts: Practice Changing the IPv4 Mask.mp4

18.7 MB

28 - Network Concepts: Address Resolution Protocol (ARP) .mp4

23.9 MB

29 - Network Concepts: DHCP Overview.mp4

25.2 MB

3 - Network Concepts: The 7 Layers of the OSI Model.mp4

23.0 MB

30 - Network Concepts: Verify DHCP with Wireshark.mp4

12.9 MB

31 - Network Concepts: DNS Overview.mp4

14.4 MB

32 - Network Concepts: DNS Records and Methods.mp4

25.5 MB

33 - Network Concepts: DNS Validation with Wireshark.mp4

15.8 MB

34 - Network Concepts: NTP.mp4

22.4 MB

35 - Network Concepts: Address Translation with PAT.mp4

20.0 MB

36 - Network Concepts: One-to-one Translations with NAT.mp4

17.0 MB

37 - Network Concepts: Wireshark Validation of NAT_PAT .mp4

16.7 MB

38 - Network Concepts: Firewall vs Next Generation Firewall (NGFW).mp4

18.4 MB

39 - Network Concepts: Access Control Lists (ACLs).mp4

24.3 MB

4 - Network Concepts: TCP_IP Suite Layers.mp4

24.8 MB

40 - Network Concepts: ACL Demonstration.mp4

20.7 MB

41 - Network Concepts: IDS vs IPS.mp4

18.7 MB

42 - Network Concepts: Network vs Host based IDS_IPS.mp4

25.5 MB

43 - Network Concepts: How IDS_IPS Identify Malicious Traffic.mp4

19.1 MB

44 - Network Concepts: Cisco Web Security.mp4

17.1 MB

45 - Network Concepts: Cisco Email Security.mp4

14.6 MB

46 - Network Concepts: AMP.mp4

16.5 MB

47 - Security Concepts: Control Types.mp4

16.6 MB

48 - Security Concepts: Confidentiality, Integrity, Availability.mp4

10.9 MB

49 - Security Concepts: RISK.mp4

24.3 MB

5 - Network Concepts: Core TCP_IP Protocols.mp4

22.7 MB

50 - Security Concepts: Separation of Duties.mp4

25.3 MB

51 - Security Concepts: MAC, DAC, and RBAC.mp4

27.7 MB

52 - Security Concepts: ISO 31000.mp4

22.6 MB

53 - Cryptography: Encryption Concepts.mp4

17.7 MB

54 - Cryptography: Encryption Algorithms.mp4

28.2 MB

55 - Cryptography: Hashing Concepts.mp4

24.8 MB

56 - Cryptography: Digital Signatures.mp4

15.6 MB

57 - Cryptography: Sending Public Keys in Certificates.mp4

19.9 MB

58 - Cryptography: PKI and Digital Certificates.mp4

25.2 MB

59 - Cryptography: Uses for PKI.mp4

19.1 MB

6 - Network Concepts: Wireshark Views of Core TCP_IP Protocols.mp4

20.4 MB

60 - Cryptography: IPsec Fundamentals.mp4

20.4 MB

61 - Host-Based Analysis: Windows Fundamentals.mp4

21.7 MB

62 - Host-Based Analysis: Linux Fundamentals.mp4

17.3 MB

63 - Host-Based Analysis: Endpoint Technologies.mp4

23.8 MB

64 - Security Monitoring: Using NetFlow.mp4

22.1 MB

65 - Security Monitoring: Getting the Right Data.mp4

25.1 MB

66 - Security Monitoring: Firepower Management Center.mp4

23.2 MB

67 - Attack Methods: Social Engineering Concepts.mp4

24.8 MB

68 - Attack Methods: Social Engineering Phases and Techniques.mp4

16.5 MB

69 - Attack Methods: Social Engineering Prevention.mp4

14.3 MB

7 - Network Concepts: How Ports Are Used in TCP_IP.mp4

28.8 MB

70 - Attack Methods: DoS Overview.mp4

32.7 MB

71 - Attack Methods: DoS Prevention.mp4

32.3 MB

72 - Attack Methods: CAM Table Overflow and Port Security Concepts.mp4

24.9 MB

73 - Attack Methods: CAM Table Overflow and Port Security Demonstration.mp4

17.6 MB

74 - Attack Methods: ARP Spoofing Overview.mp4

25.4 MB

75 - Attack Methods: ARP Spoofing Mitigation.mp4

11.5 MB

76 - Attack Methods: Cross-site Scripting.mp4

24.7 MB

77 - Attack Methods: SQL Introduction.mp4

38.8 MB

78 - Attack Methods: SQL Injection Overview.mp4

25.4 MB

79 - Attack Methods: SQL Injection Attack Demonstration.mp4

7.3 MB

8 - Network Concepts: Verify L4 Ports with Wireshark.mp4

14.4 MB

80 - Attack Methods: Command Injection Attacks.mp4

17.2 MB

81 - Attack Methods: Shellshock.mp4

12.6 MB

82 - Attack Methods: Buffer Overflows.mp4

27.2 MB

83 - Attack Methods: Malware Concepts.mp4

23.1 MB

84 - Attack Methods: L2 and Switch Related Compromises.mp4

19.6 MB

85 - Attack Methods: Steganography .mp4

32.7 MB

86 - Attack Methods: Amplification Attacks.mp4

16.2 MB

87 - Attack Methods: Evasion Techniques.mp4

33.7 MB

9 - Network Concepts: Common Protocols and Their Well-Known Ports.mp4

25.5 MB

/2 - Cisco Certified CyberOps Associate 210-255 SECOPS/

1 - Welcome to SECOPS.mp4

9.4 MB

10 - Threat Analysis: Using 802.1X and NAC.mp4

15.4 MB

11 - Network Intrusion Analysis: Regular Expressions Overview.mp4

19.5 MB

12 - Network Intrusion Analysis: Regular Expressions Demo.mp4

24.8 MB

13 - Network Intrusion Analysis: Firewall Connection Logs.mp4

20.5 MB

14 - Network Intrusion Analysis: Wireshark Overview.mp4

22.8 MB

15 - Network Intrusion Analysis: Wireshark Capture Filters.mp4

23.7 MB

16 - Network Intrusion Analysis: Wireshark Display Filters.mp4

35.7 MB

17 - Network Intrusion Analysis: Wireshark Object Extraction.mp4

9.3 MB

18 - Network Intrusion Analysis: Wireshark Packet Information.mp4

12.1 MB

19 - Network Intrusion Analysis: IDS_IPS Alert Types.mp4

18.2 MB

2 - Threat Analysis: CVSS Metric Categories.mp4

16.0 MB

20 - Incident Response: Overview.mp4

26.6 MB

21 - Incident Response: Phases.mp4

13.2 MB

22 - Incident Response: Preparation Phase.mp4

18.4 MB

23 - Incident Response: Detection and Analysis Phase.mp4

19.6 MB

24 - Incident Response: Containment, Eradication, and Recovery.mp4

21.7 MB

25 - Incident Response: Post-Incident Activity.mp4

12.4 MB

26 - Incident Response: CSIRT.mp4

21.8 MB

27 - Incident Response: Profiles of Networks and Servers.mp4

20.3 MB

28 - Incident Response: Compliance Frameworks.mp4

16.4 MB

29 - Data and Event Analysis: 5-tuple Correlation.mp4

25.5 MB

3 - Threat Analysis: CVSS Calculator Demo.mp4

22.4 MB

30 - Data and Event Analysis: Deterministic and Probabilistic Analysis.mp4

12.1 MB

31 - Data and Event Analysis: Enterprise Tools for Security.mp4

11.5 MB

32 - Data and Event Analysis: Retrospective Analysis.mp4

13.2 MB

33 - Data and Event Analysis: HTTP Header and User Agent.mp4

12.9 MB

34 - Data and Event Analysis: Data Normalization.mp4

8.9 MB

35 - Data and Event Analysis: Data Mapping.mp4

11.0 MB

36 - Incident Handling: The Forensic Process.mp4

14.0 MB

37 - Incident Handling: VERIS.mp4

20.5 MB

38 - Incident Handling: Cyber Kill Chain Model.mp4

24.7 MB

4 - Threat Analysis: Evidence.mp4

26.4 MB

5 - Threat Analysis: Linux File System Controls.mp4

17.3 MB

6 - Threat Analysis: Reconnaissance (An Attacker's Viewpoint).mp4

38.7 MB

7 - Threat Analysis: Linux EXT File Systems.mp4

11.8 MB

8 - Threat Analysis: Windows File Systems.mp4

15.0 MB

9 - Threat Analysis: NTFS Alternate Data Streams.mp4

33.5 MB

 

Total files 125


Copyright © 2025 FileMood.com