0:00 The Complete Cybersecurity
2:41 Describing the CIA Triad
Comparing Security Deployments
5:42 Network, Endpoint, and Appl
7:20 Agentless and Agent-based P
11:40 Legacy Antivirus and Antim
15:10 SIEM, SOAR, and Log Manage
19:34 Defining Threat Intelligen
25:02 Defining Threat Hunting
32:27 Understanding Malware Anal
35:55 Interpreting the Output Re
37:30 Understanding the Differen
40:39 Defining Run Book Automati
42:52 Defining Reverse Engineeri
47:07 Understanding the Sliding
48:28 Performing Risk Assessment
56:10 Comparing Threats, Vulnera
1:04:01 Understanding Authentica
1:07:11 Examining the Access Con
1:10:34 Examining the Access Con
1:16:37 Examining the Access Con
1:24:53 Understanding Discretion
1:29:15 Understanding Mandatory
1:33:35 Understanding Role-based
1:36:31 Understanding Attribute-
1:39:16 Understanding Rule-based
1:42:32 Understanding Time-based
1:43:45 Surveying Types of Vulne
1:56:24 Understanding Passive Re
2:08:51 Understanding Active Rec
2:20:34 Understanding Privilege
2:22:38 Understanding Backdoors
2:28:24 Understanding Denial of
2:34:01 Surveying Attack Methods
2:36:34 Understanding ARP Cache
2:43:42 Understanding Password A
2:47:55 Understanding Wireless A
2:52:15 Exploring Security Evasi
3:00:00 Identifying the Challeng
3:07:32 Identifying Potential Da
3:09:27 Comparing Rule-based Det
3:13:19 Understanding the Basic
3:19:10 Introducing Public Key I
3:22:49 Deciphering Encryption A
3:26:23 Understanding Hashing Al
3:32:22 Examining Secure Socket
3:36:40 Examining Digital Certif
3:43:58 Describing Concepts as D
3:49:28 Mapping the Organization
3:53:58 Scoping the Incident Res
4:05:32 Understanding Informatio
4:08:26 Identifying the Incident
4:10:18 Analyzing Computer Incid
4:18:43 Analyzing Product Securi
4:29:33 Surveying Coordination C
4:33:14 Analyzing Managed Securi
4:36:15 Introducing the Vocabula
4:38:29 Applying the VERIS Schem
4:42:58 Surveying the VERIS Inci
4:44:29 Describing Endpoint-base
4:54:22 Understanding Data Norma
4:57:22 Deconstructing Universal
5:00:30 Understanding the 5-tupl
5:02:39 Performing DNS Analysis
5:04:11 Performing Web Log Analy
5:08:31 Performing Deterministic
5:10:31 Understanding Security M
5:13:12 Surveying Security Monit
5:16:00 Grasping Security Monito
5:29:28 Identifying and Mitigati
5:38:02 Identifying and Mitigati
5:40:37 Identifying and Mitigati
5:42:42 Identifying and Mitigati
5:43:45 Identifying and Mitigati
5:46:35 Identifying and Mitigati
5:48:15 Understanding Action on
5:50:33 Understanding the MITRE
6:04:28 Examining Types of Evide
6:12:09 Understanding Chain of C
6:19:04 Understanding Evidence C
6:32:53 Handling Evidence
6:37:31 Examining Asset and Thre
6:42:56 Examining Host-based Int
6:46:31 Exploring Antimalware an
6:52:14 Understanding Host-based
6:56:18 Exploring Application-le
6:58:21 Exploring Systems-based
7:02:31 Understanding Windows Fo
7:17:04 Surveying Windows Forens
7:20:41 Surveying Windows Forens
7:26:36 Surveying Windows Forens
7:33:52 Surveying Windows Forens
7:42:09 Understanding Linux and
7:55:10 Examining Web Server Log
8:01:17 Introducing Intrusion An
8:09:30 Examining Packet Capture
8:15:06 Examining Protocol Heade
8:17:24 Analyzing Security Devic
8:22:46 Differentiating False Po
8:25:37 Comparing Inline Traffic
8:27:49 Extracting Files from a
8:29:04 Interpreting Common Arti
8:33:10 Understanding Authentica
8:45:38 Exploring the RADIUS Pro
8:49:27 Surveying the TACACS Pr
8:52:03 Understanding Authorizat
8:54:36 Surveying Authorization
8:59:13 Defining Accounting
9:01:10 Exploring Multifactor Au
9:07:36 Exploring Examples of Mu
9:09:23 Defining Network Visibil
9:11:43 Introducing NetFlow and
9:14:05 Describing Flexible NetF
9:18:24 Understanding NetFlow De
9:21:35 Introducing Network Segm
9:23:33 Exploring Application-ba
9:25:48 Describing Network Acces
9:27:44 Configuring and Verifyin
9:32:51 Configuring and Verifyin
9:36:48 Configuring and Verifyin
9:39:54 Configuring and Verifyin
9:45:59 Exploring and Mitigating
9:50:30 Understanding and Config
9:52:52 Understanding and Config
9:55:47 Understanding the Contro
10:01:40 Exploring How to Secure
10:07:01 Exploring How to Secure
10:13:09 Exploring How to Secure
10:17:15 Introducing SDN
10:21:44 Explaining North Bound
10:24:32 Introducing Cisco ACI
10:30:45 Introducing Cisco DNA a
10:37:52 Understanding VXLAN and
10:41:07 Understanding Microsegm
10:45:11 Surveying Open Source S
10:48:37 Understanding the Threa
10:51:02 Understanding the Secur
10:53:01 Introducing Network Pro
11:01:45 Exploring DevNet and De
11:02:58 Introducing APIs, NETCO
11:14:27 A Brief Introduction to
11:20:38 Exploring pxGrid
11:25:45 Integrating and Automat
11:29:13 Introducing Ethical Hac
11:35:42 Exploring Penetration T
11:44:55 Explaining the Importan