:Search:

Cisco Certified Support Technician CCST Cybersecurity 100 160

Torrent:
Info Hash: 59312404B6F09BD7BAD22CE73D8E8C081DB7B3F3
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 666
Type: Tutorials
Language: English
Category: Other
Size: 820.1 MB
Added: May 29, 2025, 6:50 a.m.
Peers: Seeders: 0, Leechers: 1 (Last updated: 3 weeks, 3 days ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.therarbg.to:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 0 0 500
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce 0 0 0
udp://open.stealth.si:80/announce 0 0 166
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://wepzone.net:6969/announce 0 0 0
udp://tracker1.myporn.club:9337/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.srv00.com:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 01 - Welcome to the course.mp4 7.8 MB
  3. 01 - Welcome to the course.srt 6.3 KB
  4. 02 - Meet your instructor.mp4 2.5 MB
  5. 02 - Meet your instructor.srt 1.5 KB
  6. 01 - Module 1 Cybersecurity essentials and core concepts.mp4 1.6 MB
  7. 01 - Module 1 Cybersecurity essentials and core concepts.srt 1.0 KB
  8. 02 - Cybersecurity defined.mp4 11.8 MB
  9. 02 - Cybersecurity defined.srt 6.5 KB
  10. 03 - CIA triad.mp4 8.7 MB
  11. 03 - CIA triad.srt 7.0 KB
  12. 04 - Vulnerabilities, threats, exploits, and risks.mp4 4.9 MB
  13. 04 - Vulnerabilities, threats, exploits, and risks.srt 4.2 KB
  14. 05 - Attack vectors.mp4 16.4 MB
  15. 05 - Attack vectors.srt 14.3 KB
  16. 01 - Module 2 Threat landscape and attack motives.mp4 1.5 MB
  17. 01 - Module 2 Threat landscape and attack motives.srt 842 bytes
  18. 02 - Categories of attackers.mp4 4.3 MB
  19. 02 - Categories of attackers.srt 4.7 KB
  20. 03 - Motivation for attacks.mp4 3.3 MB
  21. 03 - Motivation for attacks.srt 3.5 KB
  22. 04 - Malware.mp4 8.4 MB
  23. 04 - Malware.srt 7.5 KB
  24. 05 - Social engineering attacks.mp4 18.3 MB
  25. 05 - Social engineering attacks.srt 14.1 KB
  26. 06 - Physical attacks.mp4 6.4 MB
  27. 06 - Physical attacks.srt 5.5 KB
  28. 07 - Denial of service (DoS) attacks.mp4 11.2 MB
  29. 07 - Denial of service (DoS) attacks.srt 9.5 KB
  30. 08 - Man-in-the-middle attacks.mp4 20.3 MB
  31. 08 - Man-in-the-middle attacks.srt 16.8 KB
  32. 09 - Internet of things (IoT) weaknesses.mp4 8.2 MB
  33. 09 - Internet of things (IoT) weaknesses.srt 6.2 KB
  34. 10 - Bring your own device (BYOD) considerations.mp4 8.5 MB
  35. 10 - Bring your own device (BYOD) considerations.srt 8.3 KB
  36. 11 - Advanced persistent threat (APT).mp4 5.3 MB
  37. 11 - Advanced persistent threat (APT).srt 4.9 KB
  38. 01 - Module 3 Strengthening your security posture.mp4 1.4 MB
  39. 01 - Module 3 Strengthening your security posture.srt 833 bytes
  40. 02 - Defense in depth.mp4 17.9 MB
  41. 02 - Defense in depth.srt 16.2 KB
  42. 03 - System hardening.mp4 9.5 MB
  43. 03 - System hardening.srt 6.3 KB
  44. 04 - Multi-factor authentication (MFA).mp4 3.7 MB
  45. 04 - Multi-factor authentication (MFA).srt 3.7 KB
  46. 05 - Password policies and alternatives.mp4 8.4 MB
  47. 05 - Password policies and alternatives.srt 6.7 KB
  48. 06 - Authentication, authorization, and accounting (AAA).mp4 6.8 MB
  49. 06 - Authentication, authorization, and accounting (AAA).srt 6.7 KB
  50. 07 - Encryption.mp4 20.1 MB
  51. 07 - Encryption.srt 15.6 KB
  52. 08 - Protocols supporting encryption.mp4 10.3 MB
  53. 08 - Protocols supporting encryption.srt 7.8 KB
  54. 09 - Code of ethics.mp4 6.5 MB
  55. 09 - Code of ethics.srt 5.6 KB
  56. 01 - Module 4 Network foundations and security fundamentals.mp4 1.6 MB
  57. 01 - Module 4 Network foundations and security fundamentals.srt 958 bytes
  58. 02 - TCPIP protocol weaknesses.mp4 26.1 MB
  59. 02 - TCPIP protocol weaknesses.srt 18.0 KB
  60. 03 - MAC address security considerations.mp4 8.4 MB
  61. 03 - MAC address security considerations.srt 7.5 KB
  62. 04 - IPv4 and IPv6 address security considerations.mp4 22.9 MB
  63. 04 - IPv4 and IPv6 address security considerations.srt 17.4 KB
  64. 05 - Security appliances.mp4 13.7 MB
  65. 05 - Security appliances.srt 12.9 KB
  66. 06 - Cloud security considerations.mp4 10.5 MB
  67. 06 - Cloud security considerations.srt 7.5 KB
  68. 07 - Proxy servers.mp4 6.7 MB
  69. 07 - Proxy servers.srt 5.6 KB
  70. 08 - Honeypots and honeynets.mp4 2.5 MB
  71. 08 - Honeypots and honeynets.srt 2.1 KB
  72. 01 - Module 5 Controlling access and protecting the network edge.mp4 1.7 MB
  73. 01 - Module 5 Controlling access and protecting the network edge.srt 1.0 KB
  74. 02 - Access control list (ACL) overview.mp4 8.4 MB
  75. 02 - Access control list (ACL) overview.srt 7.7 KB
  76. 03 - Numbered standard ACLs.mp4 15.7 MB
  77. 03 - Numbered standard ACLs.srt 12.1 KB
  78. 04 - Numbered extended ACLs.mp4 21.8 MB
  79. 04 - Numbered extended ACLs.srt 16.1 KB
  80. 05 - Named ACLs.mp4 29.5 MB
  81. 05 - Named ACLs.srt 20.9 KB
  82. 06 - ACL considerations.mp4 19.7 MB
  83. 06 - ACL considerations.srt 14.6 KB
  84. 07 - Virtual private networks (VPNs).mp4 18.3 MB
  85. 07 - Virtual private networks (VPNs).srt 16.7 KB
  86. 08 - Network access control (NAC).mp4 15.9 MB
  87. 08 - Network access control (NAC).srt 13.2 KB
  88. 09 - Securing a small officehome office (SOHO) wireless LAN.mp4 24.1 MB
  89. 09 - Securing a small officehome office (SOHO) wireless LAN.srt 18.9 KB
  90. 01 - Module 6 Operating system security and network tools.mp4 6.3 MB
  91. 01 - Module 6 Operating system security and network tools.srt 2.9 KB
  92. 02 - Microsoft Windows security considerations.mp4 19.1 MB
  93. 02 - Microsoft Windows security considerations.srt 12.7 KB
  94. 03 - macOS security considerations.mp4 20.3 MB
  95. 03 - macOS security considerations.srt 16.4 KB
  96. 04 - Linux security considerations.mp4 17.8 MB
  97. 04 - Linux security considerations.srt 14.6 KB
  98. 05 - netstat utility.mp4 12.3 MB
  99. 05 - netstat utility.srt 7.3 KB
  100. 06 - nslookup utility.mp4 6.0 MB
  101. 06 - nslookup utility.srt 4.6 KB
  102. 07 - tcpdump utility.mp4 16.2 MB
  103. 07 - tcpdump utility.srt 9.2 KB
  104. 01 - Module 7 System maintenance, updates, and logging.mp4 1.6 MB
  105. 01 - Module 7 System maintenance, updates, and logging.srt 858 bytes
  106. 02 - Hardware and software inventory.mp4 7.1 MB
  107. 02 - Hardware and software inventory.srt 5.5 KB
  108. 03 - Software and hardware updates.mp4 8.6 MB
  109. 03 - Software and hardware updates.srt 6.7 KB
  110. 04 - System log interpretation.mp4 14.1 MB
  111. 04 - System log interpretation.srt 10.7 KB
  112. 01 - Module 8 Security assessment and risk analysis.mp4 4.9 MB
  113. 01 - Module 8 Security assessment and risk analysis.srt 2.7 KB
  114. 02 - Vulnerability management.mp4 7.3 MB
  115. 02 - Vulnerability management.srt 5.7 KB
  116. 03 - Active vs. passive reconnaissance.mp4 7.6 MB
  117. 03 - Active vs. passive reconnaissance.srt 6.1 KB
  118. 04 - Port scanning.mp4 8.1 MB
  119. 04 - Port scanning.srt 5.8 KB
  120. 05 - Threat intelligence.mp4 11.1 MB
  121. 05 - Threat intelligence.srt 6.7 KB
  122. 06 - Vulnerability response.mp4 4.3 MB
  123. 06 - Vulnerability response.srt 3.9 KB
  124. 07 - Risk management.mp4 10.9 MB
  125. 07 - Risk management.srt 10.5 KB
  126. 08 - Security assessments.mp4 12.5 MB
  127. 08 - Security assessments.srt 9.9 KB
  128. 09 - Disaster recovery.mp4 18.3 MB
  129. 09 - Disaster recovery.srt 14.5 KB
  130. 10 - Types of backups.mp4 19.8 MB
  131. 10 - Types of backups.srt 16.8 KB
  132. 01 - Module 9 Security incident response.mp4 3.9 MB
  133. 01 - Module 9 Security incident response.srt 2.5 KB
  134. 02 - Stages of incident response.mp4 7.1 MB
  135. 02 - Stages of incident response.srt 5.5 KB
  136. 03 - Contrasting SIEM and SOAR.mp4 11.3 MB
  137. 03 - Contrasting SIEM and SOAR.srt 9.2 KB
  138. 04 - Cyber kill chain.mp4 8.2 MB
  139. 04 - Cyber kill chain.srt 6.6 KB
  140. 05 - MITRE ATT&CK matrix.mp4 5.1 MB
  141. 05 - MITRE ATT&CK matrix.srt 4.5 KB
  142. 06 - Diamond model.mp4 6.5 MB
  143. 06 - Diamond model.srt 5.3 KB
  144. 07 - Tactics, techniques, and procedures (TTP).mp4 13.6 MB
  145. 07 - Tactics, techniques, and procedures (TTP).srt 10.7 KB
  146. 08 - Evidence.mp4 6.9 MB
  147. 08 - Evidence.srt 5.8 KB
  148. 09 - Compliance regulations.mp4 7.7 MB
  149. 09 - Compliance regulations.srt 6.2 KB
  150. 01 - Module 10 Exam preparation.mp4 1.5 MB
  151. 01 - Module 10 Exam preparation.srt 1.3 KB
  152. 02 - Registering for the exam.mp4 6.7 MB
  153. 02 - Registering for the exam.srt 4.9 KB
  154. 03 - Study strategies.mp4 14.0 MB
  155. 03 - Study strategies.srt 8.3 KB
  156. 04 - What to do on exam day.mp4 5.6 MB
  157. 04 - What to do on exam day.srt 6.0 KB
  158. 01 - Module 11 Congratulations and next steps.mp4 5.3 MB
  159. 01 - Module 11 Congratulations and next steps.srt 3.1 KB
  160. Bonus Resources.txt 70 bytes

Discussion