磁力链接

magnet:?xt=urn:btih:E93FB52D1C33E9988E05B01C371E3B500195891F
推荐使用PIKPAK网盘下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看

资源截图

API Integration

文件列表

  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Course_Slides_-_CCNA_Cybersecurity_200-201_Video_Training_Series.pdf 689.3 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.mp4 57.3 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/03 - Packet Analysis and Protocol Identification using Wireshark.pdf 57.1 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/06 - Identifying Malware Activity Using Wireshark.pdf 46.2 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/05 - Demonstrating ARP Spoofing and Detection.pdf 39.1 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/11 - Using Metasploit Framework for Exploitation Basics.pdf 37.6 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/02 - Network Discovery and Host Enumeration with Nmap.pdf 37.5 MB
  • Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.mp4 36.1 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/04 - Password Cracking with John the Ripper.pdf 34.0 MB
  • Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.mp4 32.3 MB
  • Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.mp4 31.9 MB
  • Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.mp4 31.5 MB
  • Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.mp4 31.1 MB
  • Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.mp4 31.0 MB
  • Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.mp4 30.8 MB
  • Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.mp4 30.8 MB
  • Chapter 7 Exam Preparation/003. Study Strategies.mp4 29.6 MB
  • Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.mp4 28.8 MB
  • Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.mp4 28.5 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/01 - Installing and Configuring a Virtual Lab Environment.pdf 27.0 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.mp4 26.5 MB
  • Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.mp4 26.5 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.mp4 26.4 MB
  • Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.mp4 26.1 MB
  • Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.mp4 25.3 MB
  • Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.mp4 23.8 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/07 - Firewall Configuration and Rule Validation using UFW.pdf 23.3 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/10 - Web Application Vulnerability Scanning with Nikto.pdf 23.1 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/08 - DNS Enumeration Techniques.pdf 22.9 MB
  • Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.mp4 22.3 MB
  • Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.mp4 22.2 MB
  • Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.mp4 22.0 MB
  • Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.mp4 21.6 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.mp4 20.0 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.mp4 19.9 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Labs_-_CCNA_Cybersecurity/09 - Simulating and Identifying Brute Force Attacks.pdf 19.4 MB
  • Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).mp4 18.6 MB
  • Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.mp4 18.4 MB
  • Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.mp4 17.7 MB
  • Chapter 7 Exam Preparation/002. Registering for the Exam.mp4 17.7 MB
  • Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.mp4 17.3 MB
  • Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.mp4 17.2 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.mp4 16.9 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.mp4 16.8 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.mp4 16.6 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.mp4 16.5 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.mp4 16.2 MB
  • Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.mp4 16.0 MB
  • Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.mp4 16.0 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.mp4 16.0 MB
  • Chapter 1 Welcome to the Course!/001. Welcome to the Course!.mp4 15.5 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.mp4 15.5 MB
  • Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.mp4 14.9 MB
  • Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.mp4 14.3 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.mp4 13.9 MB
  • Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.mp4 13.5 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.mp4 13.2 MB
  • Chapter 2 Foundations of Digital Defense/003. The CIA Triad.mp4 13.2 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.mp4 13.1 MB
  • Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.mp4 13.0 MB
  • Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.mp4 12.9 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).mp4 12.9 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.mp4 12.6 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.mp4 12.4 MB
  • Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.mp4 12.1 MB
  • Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.mp4 11.8 MB
  • Chapter 2 Foundations of Digital Defense/019. Detection Methods.mp4 10.7 MB
  • Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.mp4 10.4 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.mp4 10.1 MB
  • Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.mp4 9.8 MB
  • Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.mp4 8.8 MB
  • Chapter 8 Next Steps/001. Congratulations and Next Steps.mp4 8.7 MB
  • Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.mp4 8.5 MB
  • Chapter 7 Exam Preparation/004. What to do on Exam Day.mp4 8.5 MB
  • Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.mp4 7.4 MB
  • Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.mp4 7.3 MB
  • Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.mp4 7.0 MB
  • Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.mp4 6.9 MB
  • Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.mp4 6.8 MB
  • Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.mp4 6.8 MB
  • Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.mp4 6.4 MB
  • Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.mp4 6.2 MB
  • Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.mp4 5.1 MB
  • Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.mp4 5.0 MB
  • Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.mp4 4.1 MB
  • Chapter 1 Welcome to the Course!/002. Meet Your Instructor.mp4 4.0 MB
  • Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.mp4 2.2 MB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #1 - CCNA Cybersecurity.pdf 282.7 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Practice_Exams_-_CCNA_Cybersecurity/Practice Exam #2 - CCNA Cybersecurity.pdf 257.3 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 4 Quiz - CCNA Cybersecurity.pdf 114.0 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 3 Quiz - CCNA Cybersecurity.pdf 107.3 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 1 Quiz - CCNA Cybersecurity.pdf 102.5 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 2 Quiz - CCNA Cybersecurity.pdf 97.6 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Module_Quizzes_-_CCNA_Cybersecurity/Module 5 Quiz - CCNA Cybersecurity.pdf 91.4 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 1 Glossary - CCNA Cybersecurity.pdf 52.9 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 2 Glossary - CCNA Cybersecurity.pdf 50.2 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 3 Glossary - CCNA Cybersecurity.pdf 41.3 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 4 Glossary - CCNA Cybersecurity.pdf 41.0 kB
  • z.CCNA-Cybersecurity-200-201-Video-Training-Series-main/Glossaries_-_CCNA_Cybersecurity/Module 5 Glossary - CCNA Cybersecurity.pdf 37.0 kB
  • Chapter 2 Foundations of Digital Defense/007. Network Security Solutions.en.srt 17.6 kB
  • Chapter 4 Endpoint Protection and Analysis/004. macOS Security Considerations.en.srt 16.5 kB
  • Chapter 3 Threat Detection and Surveillance/007. Man-in-the-Middle Attacks.en.srt 16.1 kB
  • Chapter 2 Foundations of Digital Defense/006. Defense-in-Depth.en.srt 15.7 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/007. Wireshark PCAP File Analysis for Malware Infection.en.srt 14.4 kB
  • Chapter 3 Threat Detection and Surveillance/012. Social Engineering Attacks.en.srt 13.5 kB
  • Chapter 3 Threat Detection and Surveillance/008. Protocol-Based Attacks.en.srt 13.4 kB
  • Chapter 4 Endpoint Protection and Analysis/009. Malware Analysis.en.srt 13.4 kB
  • Chapter 4 Endpoint Protection and Analysis/005. Linux Security Considerations.en.srt 13.2 kB
  • Chapter 2 Foundations of Digital Defense/012. Virtualized Solutions.en.srt 13.1 kB
  • Chapter 2 Foundations of Digital Defense/010. Agent-Based vs. Agentless Security Solutions.en.srt 12.9 kB
  • Chapter 4 Endpoint Protection and Analysis/003. Microsoft Windows Security Considerations.en.srt 12.3 kB
  • Chapter 3 Threat Detection and Surveillance/003. Monitoring Sources.en.srt 12.0 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/009. Artifact Elements.en.srt 11.8 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/008. Interpreting Protocol Headers.en.srt 11.7 kB
  • Chapter 3 Threat Detection and Surveillance/009. SQL Injection Attacks.en.srt 11.5 kB
  • Chapter 3 Threat Detection and Surveillance/019. Digital Certificate Components.en.srt 10.8 kB
  • Chapter 4 Endpoint Protection and Analysis/008. System Log Interpretation.en.srt 10.6 kB
  • Chapter 4 Endpoint Protection and Analysis/007. Evidence Identification.en.srt 10.4 kB
  • Chapter 3 Threat Detection and Surveillance/004. Data Visibility Comparison.en.srt 10.2 kB
  • Chapter 2 Foundations of Digital Defense/014. Access Control Model Options.en.srt 9.9 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/010. Regular Expressions.en.srt 9.3 kB
  • Chapter 2 Foundations of Digital Defense/011. SIEM and SOAR.en.srt 9.3 kB
  • Chapter 3 Threat Detection and Surveillance/006. Denial of Service (DoS) Attacks.en.srt 9.0 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/004. Incident Response Example.en.srt 8.8 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/002. Security Event Sources.en.srt 8.7 kB
  • Chapter 2 Foundations of Digital Defense/008. Endpoint Security Solutions.en.srt 8.7 kB
  • Chapter 7 Exam Preparation/003. Study Strategies.en.srt 8.7 kB
  • Chapter 1 Welcome to the Course!/001. Welcome to the Course!.en.srt 8.5 kB
  • Chapter 3 Threat Detection and Surveillance/010. Cross-Site Scripting (XSS) Attacks.en.srt 8.5 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/008. Categorizing Data Protection.en.srt 8.1 kB
  • Chapter 2 Foundations of Digital Defense/005. Cybersecurity Terminology.en.srt 8.0 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/005. Comparing Traffic Capture Methods and NetFlow Analysis.en.srt 7.5 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/002. Cybersecurity Management Considerations.en.srt 7.5 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/003. Incident Response Plans.en.srt 7.4 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/005. Evidence Collection Recommendations.en.srt 7.4 kB
  • Chapter 2 Foundations of Digital Defense/013. Cloud-Based Solutions.en.srt 7.4 kB
  • Chapter 3 Threat Detection and Surveillance/014. Malware and Ransomware Attacks.en.srt 7.3 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/003. Alert Classification.en.srt 7.1 kB
  • Chapter 2 Foundations of Digital Defense/015. Common Vulnerability Scoring System (CVSS).en.srt 7.1 kB
  • Chapter 3 Threat Detection and Surveillance/018. Encryption with Digital Certificates.en.srt 6.9 kB
  • Chapter 2 Foundations of Digital Defense/003. The CIA Triad.en.srt 6.7 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/007. Server Profiling.en.srt 6.7 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/006. Network Profiling.en.srt 6.6 kB
  • Chapter 4 Endpoint Protection and Analysis/002. Host-Based Protection.en.srt 6.6 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/009. Cyber Kill Chain.en.srt 6.5 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/004. Deep Packet Inspection (DPI).en.srt 6.4 kB
  • Chapter 2 Foundations of Digital Defense/002. Cybersecurity Defined.en.srt 6.4 kB
  • Chapter 2 Foundations of Digital Defense/009. Application Security Solutions.en.srt 6.3 kB
  • Chapter 7 Exam Preparation/004. What to do on Exam Day.en.srt 6.2 kB
  • Chapter 7 Exam Preparation/002. Registering for the Exam.en.srt 6.2 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/011. SOC Metrics and Scope Analysis.en.srt 6.1 kB
  • Chapter 2 Foundations of Digital Defense/018. The 5-Tuple Approach.en.srt 5.6 kB
  • Chapter 2 Foundations of Digital Defense/019. Detection Methods.en.srt 5.4 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/010. Diamond Model.en.srt 5.3 kB
  • Chapter 4 Endpoint Protection and Analysis/006. Determining Responsibility.en.srt 5.3 kB
  • Chapter 3 Threat Detection and Surveillance/005. Categories of Data Types.en.srt 4.7 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/006. Wireshark PCAP File Analysis for Telnet Flow.en.srt 4.6 kB
  • Chapter 2 Foundations of Digital Defense/004. Vulnerabilities, Threats, Exploits, and Risks.en.srt 3.9 kB
  • Chapter 3 Threat Detection and Surveillance/013. AI-Based Social Engineering Attacks.en.srt 3.5 kB
  • Chapter 2 Foundations of Digital Defense/017. Data Loss Analysis.en.srt 3.5 kB
  • Chapter 3 Threat Detection and Surveillance/016. Command and Control (C2) Attacks.en.srt 3.5 kB
  • Chapter 2 Foundations of Digital Defense/016. Data Visibility Considerations.en.srt 3.4 kB
  • Chapter 3 Threat Detection and Surveillance/017. Comparison of Obfuscation Techniques.en.srt 3.1 kB
  • Chapter 3 Threat Detection and Surveillance/002. Attack Surfaces.en.srt 2.9 kB
  • Chapter 3 Threat Detection and Surveillance/015. Buffer Overflow Attacks.en.srt 2.8 kB
  • Chapter 8 Next Steps/001. Congratulations and Next Steps.en.srt 2.4 kB
  • Chapter 4 Endpoint Protection and Analysis/001. Module 3 - Endpoint Protection and Analysis.en.srt 2.2 kB
  • Chapter 5 Network Traffic Analysis and Interpretation/001. Module 4 - Network Traffic Analysis and Interpretation.en.srt 2.1 kB
  • Chapter 3 Threat Detection and Surveillance/011. Command Injection Attacks.en.srt 2.1 kB
  • Chapter 3 Threat Detection and Surveillance/001. Module 2 - Threat Detection and Surveillance.en.srt 1.9 kB
  • Chapter 2 Foundations of Digital Defense/001. Module 1 - Foundations of Digital Defense.en.srt 1.9 kB
  • Chapter 6 Cybersecurity Governance & Best Practices/001. Module 5 - Cybersecurity Governance and Best Practices.en.srt 1.4 kB
  • Chapter 1 Welcome to the Course!/002. Meet Your Instructor.en.srt 1.4 kB
  • Chapter 7 Exam Preparation/001. Module 6 - Exam Preparation.en.srt 1.3 kB

温馨提示

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!