zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
01. Cisco CyberOps Exploring Security Concepts
magnet:?xt=urn:btih:13497e4d1ee25fe967306d8d50f3c86c743cdc22&dn=01. Cisco CyberOps Exploring Security Concepts
磁力链接详情
文件列表详情
13497e4d1ee25fe967306d8d50f3c86c743cdc22
infohash:
24
文件数量
180.36 MB
文件大小
2022-9-5 08:06
创建日期
2024-11-3 13:32
最后访问
相关分词
01
Cisco
CyberOps
Exploring
Security
Concepts
01. Course Overview/01. Course Overview.mp4 3.58 MB
02. Defining Cybersecurity What Is It Anyway/01. Introduction.mp4 4.49 MB
02. Defining Cybersecurity What Is It Anyway/02. Course Overview.mp4 11.38 MB
02. Defining Cybersecurity What Is It Anyway/03. Cybersecurity Terminology.mp4 8.9 MB
02. Defining Cybersecurity What Is It Anyway/04. Additional Cybersecurity Terms.mp4 10.16 MB
02. Defining Cybersecurity What Is It Anyway/05. Defense-in-depth.mp4 5.36 MB
02. Defining Cybersecurity What Is It Anyway/06. The CIA Triad.mp4 5.25 MB
02. Defining Cybersecurity What Is It Anyway/07. The Common Vulnerability Scoring System.mp4 9.58 MB
02. Defining Cybersecurity What Is It Anyway/08. Closing It Out!.mp4 2.14 MB
03. Identifying Common Cybersecurity Concepts/01. Introduction.mp4 2.28 MB
03. Identifying Common Cybersecurity Concepts/02. Risk Management.mp4 7.53 MB
03. Identifying Common Cybersecurity Concepts/03. Access Control Models.mp4 9.17 MB
03. Identifying Common Cybersecurity Concepts/04. Access Control Demo.mp4 7.23 MB
03. Identifying Common Cybersecurity Concepts/05. Security Technologies.mp4 9.07 MB
03. Identifying Common Cybersecurity Concepts/06. Visibility and Log Management.mp4 9.06 MB
03. Identifying Common Cybersecurity Concepts/07. Detection Methodologies.mp4 6.34 MB
04. Explaining Cybersecurity Challenges/01. Introduction.mp4 4.73 MB
04. Explaining Cybersecurity Challenges/02. Data Visibility Challenges.mp4 12.24 MB
04. Explaining Cybersecurity Challenges/03. Data Visibility Demo.mp4 10.67 MB
04. Explaining Cybersecurity Challenges/04. Traffic Profiles.mp4 3.34 MB
04. Explaining Cybersecurity Challenges/05. Traffic Profiles Demo.mp4 8.24 MB
04. Explaining Cybersecurity Challenges/06. The 5-tuple Approach.mp4 4.27 MB
04. Explaining Cybersecurity Challenges/07. Isolating Compromised Hosts.mp4 22.1 MB
04. Explaining Cybersecurity Challenges/08. Let's Wrap!.mp4 3.24 MB
其他位置