RAR-files |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.5.security.policies.and.procedures-xqzt.rar |
50,000,000 |
48D89E95 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.5.security.policies.and.procedures-xqzt.r00 |
50,000,000 |
F6DB7DD4 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.5.security.policies.and.procedures-xqzt.r01 |
50,000,000 |
33857980 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.5.security.policies.and.procedures-xqzt.r02 |
50,000,000 |
98FC76F5 |
linkedin.learning.cisco.certified.cyberops.associate.cert.prep.5.security.policies.and.procedures-xqzt.r03 |
10,745,218 |
8277E002 |
|
Total size: |
210,745,218 |
|
|
Archived
files |
01.01-protecting_the_data.mkv
[d2925ddce5721763]
|
4,378,286 |
21CE22A9 |
01.02-prepare_for_cisco_cbrops_exam_v1.0.mkv
[b2f7bbbab87c1cc1]
|
2,265,932 |
7A55DBD3 |
01.03-setting_up_your_test_environment.mkv
[4adee3da0b0aef72]
|
7,132,681 |
6D7A54CD |
02.01-summarizing_risk_management.mkv
[f3fc7110d35dc76e]
|
8,808,429 |
9FAAB298 |
02.02-protecting_assets.mkv
[122359bd3a9dcb7e]
|
8,750,917 |
9E9345E0 |
02.03-reviewing_configuration_management.mkv
[acb8ea6c3f380934]
|
7,745,556 |
B8D335AF |
02.04-outlining_mobile_device_management.mkv
[4a23b8b86811d919]
|
7,455,875 |
4FA11FF0 |
02.05-updating_and_patching_organizational_assets.mkv
[39bb699ad648a4d3]
|
3,880,666 |
3DDB8499 |
02.06-creating_security_policies.mkv
[f17d89253ed277b3]
|
7,436,418 |
C8F6EAF7 |
02.07-challenge_create_a_security_policy.mkv
[9415b6d99225e077]
|
2,058,121 |
0F656709 |
02.08-solution_create_a_security_policy.mkv
[b062b9b9de9a0e45]
|
14,342,985 |
C676EDBF |
03.01-understanding_incidents.mkv
[5b9f851c3e07c555]
|
8,126,411 |
5D900DFB |
03.02-preparing_for_an_incident.mkv
[f33eb2829c5dd87a]
|
7,733,472 |
34ABD4EB |
03.03-detecting_incidents.mkv
[2928b86dbb70f8d5]
|
11,373,411 |
375218EE |
03.04-managing_incidents.mkv
[3bde7025aad3efd4]
|
9,135,352 |
A241B4F7 |
03.05-collecting_evidence.mkv
[7a9d9b107a91fb9b]
|
7,478,014 |
79030BAE |
03.06-closing_an_incident.mkv
[dc6434248bfc9a0f]
|
6,521,076 |
AFF5977D |
04.01-understanding_network_profiling.mkv
[aae5712046edd8f7]
|
20,054,220 |
C30F2E4C |
04.02-profiling_server_behavior.mkv
[179f6601c3fb9934]
|
9,861,259 |
672D9C83 |
04.03-challenge_examine_suspect_ip_addresses.mkv
[f3979315541957ae]
|
2,697,721 |
283908C8 |
04.04-solution_examine_suspect_ip_addresses.mkv
[5c9b6da61bdc7d3c]
|
11,765,142 |
87BF2D62 |
05.01-identifying_protected_data.mkv
[5efb35f1c9270067]
|
7,350,803 |
C8D279DC |
05.02-outlining_the_cyber_kill_chain_model.mkv
[9b1899be4357fa8f]
|
9,679,204 |
69EFD3F2 |
05.03-pivoting_through_the_diamond_model_of_intrusion.mkv
[364adf1823dc93e8]
|
7,079,742 |
30279599 |
05.04-evaluating_soc_key_performance_indicators.mkv
[7561fe5c4f1e2032]
|
7,190,614 |
C399DCBD |
05.05-challenge_the_cyber_kill_chain.mkv
[e128bc390792146a]
|
2,653,455 |
921CFB8F |
05.06-solution_the_cyber_kill_chain.mkv
[988c71fb9cb8d15c]
|
5,794,799 |
B77B53EB |
06.01-next_steps.mkv
[bf0c472fae17d657]
|
1,934,407 |
6A0A4A00 |
Ex_Files_Cisco_Cert_CyberOps_Associate_Cert_Prep_5.zip |
57,521 |
60205003 |
|
Total size: |
210,742,489 |
|
|