There is no glory in what used to be the 'scene' - download for fun, don't fuck with it. ―krazy8
  • U: Anonymous
  • D: 2021-05-06 18:16:51
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
38,146
Stored files
748 AEE0E959
27,690 D37F2BAE
1,122 E7CBA56E
RAR-files
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.rar 50,000,000 913BA9AE
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r00 50,000,000 D4061088
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r01 50,000,000 BE83D72E
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r02 50,000,000 51B10913
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r03 50,000,000 B34D66DA
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r04 50,000,000 29569A03
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r05 50,000,000 1DFF5892
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r06 50,000,000 C89D4732
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r07 50,000,000 70B4C22A
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r08 50,000,000 DDFFA1D3
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt.r09 35,456,774 79FC044A

Total size: 535,456,774
Archived files
01.01-defending_the_network.mkv [ae98bc8a8c7289f0] 7,124,447 C30C4176
01.02-prepare_for_cisco_cbrops_exam.mkv [bf17ec7cf802c2a4] 3,025,128 850D8833
01.03-setting_up_your_test_environment.mkv [feae49e5b09244f3] 7,116,180 5BD47FF3
02.01-recognizing_todays_threats.mkv [bc6d03e4b465ef2] 2,529,656 9F42066D
02.02-understanding_the_threat_actor.mkv [154c48f5f0a7df49] 10,752,339 C2DAFE4D
02.03-outlining_the_cia_triad.mkv [313cd7b075ea888f] 19,202,405 EBFDE728
02.04-having_zero_trust.mkv [63b29020db5a1c71] 10,989,560 897F118C
02.05-exploring_risk.mkv [649d3bb1d04a8eda] 7,455,126 17385BA1
02.06-analyzing_risk.mkv [7efe1e2742d330e] 10,691,493 D93F2D6A
02.07-challenge_overview_of_malware.mkv [c78b16b596af0d10] 5,628,497 D0D0CAAD
02.08-solution_overview_of_malware.mkv [b90dcaf450848f92] 16,210,355 E28FDB75
03.01-using_the_cvss.mkv [1cc4b9a9ea875034] 14,901,289 16DE825D
03.02-interpreting_cvss_metric_groups.mkv [bba8a4508d06f02a] 12,533,477 7AB3C764
03.03-understanding_the_cve_and_the_nvd.mkv [94bd2db067ae8f13] 16,380,151 4FF79E5E
03.04-challenge_temporal_metric_group.mkv [66cf8f341d07608] 6,763,450 1C27FB38
03.05-solution_temporal_metric_group.mkv [4c2bb742ef73c046] 11,239,723 8058A80B
04.01-using_the_principle_of_least_privilege.mkv [f68cc861c8324302] 11,878,019 3D9E7D7F
04.02-defining_access_control.mkv [ddc74eedee61f6e2] 13,660,230 D452CD4E
04.03-comparing_access_control_models.mkv [a0d7e8831ded9c49] 16,379,727 91C74D5A
04.04-summarizing_triple-a_security.mkv [a569af950b225441] 10,329,058 C84C6D52
04.05-verifying_authentication.mkv [365f54aef713e587] 10,318,846 AD4E3F38
04.06-granting_authorization.mkv [1bd456cdcd75ddf] 9,098,961 765BEB57
04.07-accounting_and_logging_activity.mkv [e2c1927619a90dc] 9,739,755 5FFAD423
04.08-challenge_network_diagram.mkv [b280ec9c004797d8] 5,317,438 EF47A15D
04.09-solution_network_diagram.mkv [1b19873d50e54566] 17,211,626 AB694949
05.01-recognizing_the_complexity_of_todays_environment.mkv [260172d62d5a6b48] 10,641,639 5860B9EA
05.02-leveraging_threat_intelligence.mkv [9ab86a184cd0d469] 20,484,744 0374F40C
05.03-hunting_threats.mkv [bb7a4eb1a02c0f22] 14,928,275 C6340808
05.04-analyzing_malware.mkv [5ba40a82f96d3252] 9,253,989 32E90730
05.05-dissecting_malware_using_reverse_engineering.mkv [773e71fc17dc5c75] 35,985,217 6D1A1D2B
05.06-detecting_anomalies_using_the_sliding_window.mkv [8e1d8c65d04adde5] 18,197,441 B7F491F3
05.07-comparing_detection_methods.mkv [b7e8c10e9223a5a3] 16,315,314 165FAFB6
05.08-using_five-tuple_log_analysis.mkv [f5cb7994758abfe6] 20,450,103 42ECABA2
05.09-monitoring_data_loss_using_traffic_profiles.mkv [1bef24cefdbbe9bd] 16,835,101 245EF938
06.01-identifying_challenges_of_data_visibility.mkv [14c6fc0c860e6088] 8,765,456 795034C2
06.02-comparing_security_deployments.mkv [67327015cccc4829] 11,074,870 D8F82C7A
06.03-using_agentless_or_agent-based_methods.mkv [de8410209677489d] 9,028,370 28C21FFB
06.04-utilizing_siem_soar_and_log_management.mkv [2a893d6af1df68ab] 12,562,475 0B200FDA
06.05-employing_runbook_automation.mkv [ebd1b91523183b65] 14,549,942 6CFDD310
06.06-exploring_nmap.mkv [bba961a08a31f1b5] 17,816,058 C902B60C
06.07-challenge_using_nmap.mkv [dee74a3d0191711b] 11,305,531 E6D8DCEA
06.08-solution_using_nmap.mkv [a6070ebc013d1d8d] 17,152,613 115F202D
07.01-next_steps.mkv [c3f4b894c45774d5] 3,433,878 CE293C5C
Ex_Files_CyberOps.zip 194,378 6FEB67C5

Total size: 535,452,330
Video files
Sample
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.1.security.concepts-xqzt-sample.mkv 2,546,318 DEE5FDB4
RAR Recovery
Not Present
Labels UNKNOWN