Cybersecurity Level 2 Labs (Practical)

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

Course Content

Cybersecurity Level 2

  • Part 1 Introduction to Cybersecurity | Network | Cloud | SOC Security Level 2 Labs | Cyber Pashto
    24:21
  • Part 2 Cybersecurity Lab 1 | Configuring TCP IP and a Virtual Router | Cyber Pashto
    21:18
  • Part 3 Cybersecurity Lab 2 Malware Analysis
    16:55
  • Part 4 Cybersecurity Lab 3 Creating a Zero Trust Environment
    23:28
  • Part 5 Cybersecurity Lab 4 Configuring Authentication
    20:00
  • Part 6 Cybersecurity Lab 5 Using Two Factor Authentication to Secure the Firewall
    20:36
  • Part 7 Cybersecurity Lab 6 Allowing Only Trusted Applications | Cyber Pashto
    15:00
  • Part 8 Network Security Lab 1 Configuring DHCP
    24:00
  • Part 9 Network Security Lab 2 Configuring Virtual IP Addresses
    20:00
  • Part 10 Network Security Lab 3 Creating Packet Captures
    10:00
  • Part 11 Network Security Lab 4 Analyzing Packet Captures
    14:00
  • Part 12 Network Security Lab 5 Managing Digital Certificates
    22:00
  • Part 13 Network Security Lab 6 Decrypting SSH Traffic
    18:00
  • Part 14 Network Security Lab 7 Decrypting SSL Inbound Traffic
    23:00
  • Part 15 Network Security Lab 8 Backing up Firewall Logs
    10:00
  • Part 16 Cloud Security Lab 1 Protecting Sensitive Data
    22:00
  • Part 17 Cloud Security Lab 2 Preventing Threats from the Internet with File Blocking
    13:00
  • Part 18 Cloud Security Lab 3 Denying International Attackers
    07:00
  • Part 19 Cloud Security Lab 4 Configuring HIP for Global Protect VPN
    22:09
  • Part 20 Cloud Security Lab 5 Container Vulnerability Scanning Part A
    18:00
  • Part 21 Cloud Security Lab 5 Container Vulnerability Scanning Part B
    20:00
  • Part 22 SOC Lab 1 Network Traffic Analysis
    27:00
  • Part 23 SOC Lab 2 Using the Application Command Center ACC to Find Threats
    11:19
  • Part 24 SOC Lab 3 Analyzing Firewall Logs
    08:00
  • Part 25 SOC Lab 4 Log Forwarding to Linux
    12:00
  • Part 26 Security Operations Lab 5 Stopping Reconnaissance Attacks
    12:00
  • Part 27 Security Operations Lab 6 Securing Endpoints using Vulnerability Profiles
    26:00
  • Part 28 Security Operations Lab 7 Threat Intelligence
    40:00
  • Part 29 Security Operations Lab 8 Using Dynamic Block Lists
    21:00

Student Ratings & Reviews

No Review Yet
No Review Yet