Create Tool:
Create Time:1970-01-01 08:00:00
File Size:22.44 GB
File Count:972
File Hash:801551349d5128e4d81696d098b7a6f27b40934d
MP3 2020/SEC511_1A_E01.mp3 | 69.86 MB |
MP3 2020/SEC511_1B_E01.mp3 | 66.79 MB |
MP3 2020/SEC511_1C_E01.mp3 | 58.52 MB |
MP3 2020/SEC511_1D_E01.mp3 | 108.85 MB |
MP3 2020/SEC511_2A_E01.mp3 | 80.75 MB |
MP3 2020/SEC511_2B_E01.mp3 | 72.85 MB |
MP3 2020/SEC511_2C_E01.mp3 | 72.79 MB |
MP3 2020/SEC511_2D_E01.mp3 | 104.88 MB |
MP3 2020/SEC511_3A_E01.mp3 | 76.56 MB |
MP3 2020/SEC511_3B_E01.mp3 | 72.34 MB |
MP3 2020/SEC511_3C_E01.mp3 | 53.17 MB |
MP3 2020/SEC511_3D_E01.mp3 | 117.57 MB |
MP3 2020/SEC511_4A_E01.mp3 | 80.53 MB |
MP3 2020/SEC511_4B_E01.mp3 | 77.90 MB |
MP3 2020/SEC511_4C_E01.mp3 | 48.29 MB |
MP3 2020/SEC511_4D_E01.mp3 | 102.84 MB |
MP3 2020/SEC511_5A_E01.mp3 | 79.87 MB |
MP3 2020/SEC511_5B_E01.mp3 | 49.55 MB |
MP3 2020/SEC511_5C_E01.mp3 | 58.00 MB |
MP3 2020/SEC511_5D_E01.mp3 | 133.54 MB |
MP3 2020/SEC511_6A_E01.mp3 | 45.24 MB |
PDF 2020/SEC511_E01_01_16905.pdf | 42.33 MB |
USB 2020/Sec511 Virtual Machine.iso | 13.80 GB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/1. Current State Assessment SOCs and Security Architecture.mp4 | 112.43 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/2. Table of Contents 1.mp4 | 1.30 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/3. Table of Contents 2.mp4 | 63.35 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/4. Course Roadmap 1.mp4 | 57.26 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/5. Main Topics Covered in SEC511.mp4 | 89.50 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/6. Current State Assessment.mp4 | 3.85 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/7. Defensible Network Security Architecture.mp4 | 2.53 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/8. Network Security Monitoring NSM.mp4 | 1.81 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/9. Endpoint Security Architecture.mp4 | 3.65 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/10. Continuous Security Monitoring CSM.mp4 | 1.34 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/11. CSM 2.mp4 | 1.43 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/12. Capstone NetWars.mp4 | 6.02 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/13. StartJoin the Conversation.mp4 | 4.08 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/14. Demos Exercises and the Capstone.mp4 | 10.39 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/15. Daily Immersive Cyber Challenges.mp4 | 513.51 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/16. Exercise EnvironmentLaptop Requirements.mp4 | 4.41 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/17. Courseware Conventions.mp4 | 397.56 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/18. Short Links.mp4 | 3.56 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/19. Actionable Information Immediate Results.mp4 | 9.06 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/20. SEC511 Course PortalWiki.mp4 | 165.62 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/21. SEC511 Portal Landing Page.mp4 | 70.22 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/22. SEC511 Portal Electronic Labs.mp4 | 77.32 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/23. Course Roadmap 2.mp4 | 135.32 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/24. SEC511 Workbook Initial Configuration and Connection.mp4 | 230.71 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/1. Course Roadmap.mp4 | 678.19 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/2. Step 1 Admit There Is a Problem.mp4 | 1.94 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/3. Current State Industry Studies.mp4 | 611.58 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/4. Mandiant MTrends.mp4 | 7.53 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/5. Verizon DBIR.mp4 | 9.47 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/6. Verizon DBIR on Detection.mp4 | 1.55 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/7. Ponemon Cost of a Data Breach.mp4 | 9.59 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/8. Credential Compromise.mp4 | 5.79 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/9. ThirdParty Detection.mp4 | 13.73 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/10. Postmortem Detection.mp4 | 2.34 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/11. Disrupting NationState Hackers.mp4 | 5.75 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/12. Quoting Rob Joyce .mp4 | 7.06 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/13. Beware of the Perfect Solution Fallacy.mp4 | 10.85 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/14. Also Beware of the Perfect Attacker Fallacy.mp4 | 13.08 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/15. Summary.mp4 | 109.41 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/1. Course Roadmap.mp4 | 1.18 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/2. Fighting a Losing Battle.mp4 | 3.03 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/3. No End in Sight.mp4 | 1.27 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/4. Definition of Winning.mp4 | 13.07 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/5. GoalOriented Defense.mp4 | 2.08 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/6. New Security Paradigm.mp4 | 2.35 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/1. Course Roadmap.mp4 | 1.67 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/2. OpportunisticHobbyist Attackers.mp4 | 1.38 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/3. ServiceSide Exploitation.mp4 | 2.19 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/4. ServiceSide Exploitation Illustrated.mp4 | 8.13 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/5. ServiceSide Traditionaland Current.mp4 | 4.12 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/6. Relatively Benign Malware.mp4 | 4.13 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/7. HighVolume Compromise.mp4 | 2.33 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/8. Advanced Denial of Service.mp4 | 4.05 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/9. Bots Gone Wild.mp4 | 969.31 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/10. Ransomware.mp4 | 9.73 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/11. CryptoLocker.mp4 | 6.60 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/12. Cryptolocker Screenshot.mp4 | 724.98 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/1. Course Roadmap 1.mp4 | 553.43 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/2. Traditional Cyber Defense.mp4 | 1.40 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/3. PreventionOriented.mp4 | 1.61 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/4. Prevention Sanity Check.mp4 | 1.42 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/5. Sanity Check Illustrated.mp4 | 2.46 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/6. Perimeter Focused.mp4 | 7.10 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/7. Addresses Layer 34.mp4 | 4.38 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/8. DeviceDriven Security.mp4 | 6.21 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/9. Traditional Successes.mp4 | 2.66 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/10. Course Roadmap 2.mp4 | 136.92 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/11. Instructor Demo Exercise 11 and 5113 Preview.mp4 | 113.27 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/12. Instructor Demo Security Onion.mp4 | 173.09 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/13. Sguil.mp4 | 108.74 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/14. The Sguil NSM Frontend.mp4 | 130.38 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/15. Wireshark.mp4 | 134.98 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4 | 149.80 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/1. Course Roadmap.mp4 | 580.12 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/2. Motivated Adversaries.mp4 | 5.13 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/3. WellFunded Adversaries.mp4 | 6.47 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/4. Web Application Attacks.mp4 | 5.10 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/5. Layer 8Social Engineering.mp4 | 3.19 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/6. ClientSide Exploitation Phishing Illustrated Part 1.mp4 | 6.57 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/7. ClientSide Exploitation Phishing Illustrated Part 2.mp4 | 2.05 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/8. ClientSide Exploitation Phishing Illustrated Part 3.mp4 | 2.38 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/9. Why ClientSide Exploitation.mp4 | 2.76 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/1. Course Roadmap.mp4 | 138.12 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/2. ClientSide Vectors.mp4 | 1000.61 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/3. DBIR State of the Phish.mp4 | 9.54 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/4. Malicious Emails.mp4 | 1.53 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/5. Attaching the Evil.mp4 | 7.58 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/6. Phishing with Links.mp4 | 8.62 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/7. WebBased Delivery.mp4 | 2.54 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/8. Know Thy Victim.mp4 | 13.46 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/9. Malvertising.mp4 | 8.13 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/10. Watering Hole Attacks.mp4 | 6.98 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/11. Lets Get Physical.mp4 | 7.41 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/12. Mobile Small but Evil.mp4 | 2.22 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/13. Minnows 1.mp4 | 7.18 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/14. Minnows 2.mp4 | 981.95 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/1. Course Roadmap.mp4 | 1.06 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/2. Common ClientSide Targets.mp4 | 1.11 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/3. BrowserBased Exploitation.mp4 | 1.55 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/4. Browser Attacks.mp4 | 3.48 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/5. Browser Attacks without Exploits.mp4 | 3.79 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/6. Browser Plugin Exploits.mp4 | 2.99 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/7. Flash EndofLife in 2020.mp4 | 5.88 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/8. File Format Attacks.mp4 | 1.01 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/9. Maliciously Crafted Files.mp4 | 3.08 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/1. Course Roadmap.mp4 | 2.05 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/2. Advanced PostExploitation.mp4 | 1.55 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/3. DataDriven.mp4 | 865.81 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/4. Exfiltration.mp4 | 1.61 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/5. Encryptions Effects on Exfiltration.mp4 | 1.26 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/6. Lateral Movement.mp4 | 6.01 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/7. Pivoting Pictorially 1.mp4 | 3.15 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/8. Pivoting Pictorially 2.mp4 | 951.10 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/9. Pivoting Pictorially 3.mp4 | 3.98 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/10. Pivoting Pictorially 4.mp4 | 6.72 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/11. C2CCCNC.mp4 | 1.43 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/12. Persistence.mp4 | 3.58 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/13. Hiding.mp4 | 5.43 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/14. Persistence versus Hiding.mp4 | 1.60 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/15. Shell Meterpreter.mp4 | 7.09 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/16. Meterpreter Open Source Payload Capabilities.mp4 | 2.60 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/1. Course Roadmap 1.mp4 | 1.34 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/2. Modern Cyber Defense Principles.mp4 | 263.60 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/3. Presumption of Compromise.mp4 | 4.88 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/4. DetectionOriented.mp4 | 1.19 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/5. Proactive Detection Threat Hunting.mp4 | 4.51 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/6. PostExploitation Focused.mp4 | 2.96 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/7. Traditional versus Modern C2.mp4 | 6.27 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/8. ResponseDriven.mp4 | 2.53 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/9. Layer 7 Aware.mp4 | 1.79 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/10. RiskInformed.mp4 | 2.65 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/11. Course Roadmap 2.mp4 | 139.70 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/12. SEC511 Workbook Detecting Modern Attack Techniques.mp4 | 60.66 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/1. Course Roadmap.mp4 | 1.92 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/2. Adversary Informed Detection.mp4 | 1.37 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/3. Threat Intelligence.mp4 | 2.82 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/4. Intrusion Kill Chain.mp4 | 1.15 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/5. Kill Chain Phases.mp4 | 5.81 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/6. Kill Chain ATTCK.mp4 | 6.99 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/7. PostExploitation Activity Is Key.mp4 | 1.17 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/8. PostExploitation Visibility Analysis.mp4 | 2.74 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/9. Stage 2 and Persistence Visibility.mp4 | 5.44 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/10. Mandiant MTrends Example C2 via HTTP POST.mp4 | 7.10 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/11. Command and Control.mp4 | 7.48 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/12. Pivoting Lateral Movement Analysis.mp4 | 1.49 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/13. Mandiant MTrends on MetasploitPSExec.mp4 | 2.34 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/14. The Other MS PSExec ExploitPersistC2Exfil.mp4 | 7.32 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/15. Data Analysis.mp4 | 1.23 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/16. Data Exfiltration Analysis.mp4 | 2.82 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/17. Default Egress Deny.mp4 | 5.88 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/18. Outbound Blocking FTW.mp4 | 2.19 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/1. Course Roadmap.mp4 | 441.05 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/2. Information Overload.mp4 | 1.30 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/3. Security Operations Centers SOC.mp4 | 1.62 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/4. Not a SOC.mp4 | 1.12 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/5. Also Not a SOC.mp4 | 3.12 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/6. Purpose of a SOC.mp4 | 5.44 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/7. People and Process Products.mp4 | 10.01 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/8. Key SOC Roles.mp4 | 3.51 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/9. Oh Yeah Drinking the Flavored Drink Mix.mp4 | 3.17 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/10. Outsourcing the SOC.mp4 | 5.36 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/11. Making the MSSP Manage YOUR Security Services.mp4 | 8.02 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/12. Hidden OutSOC Costs.mp4 | 7.26 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/13. DIY SOC.mp4 | 2.29 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/14. InSOC.mp4 | 1.79 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/15. SOC Employee Training.mp4 | 3.88 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/16. Hybrid SOC.mp4 | 1.31 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/17. TheHive.mp4 | 1.40 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/18. Cortex.mp4 | 3.23 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/19. Relationship to Cyber Defense.mp4 | 4.84 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/20. SEC511 and Security Operations.mp4 | 1.27 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/21. SOC Sounds Like There Should Be a Book About That.mp4 | 2.18 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/1. Course Roadmap 1.mp4 | 120.73 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/2. Day 1 Punch ListAction Items.mp4 | 99.56 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/3. Day 1 TLDR.mp4 | 113.91 KB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/4. Course Roadmap 2.mp4 | 43.22 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/5. SEC511 Workbook Egress Analysis with Elastic Stack.mp4 | 126.50 MB |
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/6. SEC511 Daily NetWars.mp4 | 55.93 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/1. Network Security Architecture.mp4 | 20.43 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/2. Table of Contents 1.mp4 | 35.14 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/3. Table of Contents 2.mp4 | 29.74 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/4. Course Roadmap.mp4 | 559.91 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/5. Traditional Perimeter Defense and the Crunchy Shell.mp4 | 4.25 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/6. What About that Soft Chewy Center.mp4 | 6.93 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/7. Zero Trust Architecture ZTA.mp4 | 9.42 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/8. BeyondCorp Googles Approach to Zero Trust.mp4 | 9.84 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/9. ZTA and Modern Architectures.mp4 | 8.91 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/10. Key Infrastructure Devices.mp4 | 2.48 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/11. Cyber Defense Illustrated.mp4 | 4.02 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/12. Caprica 6 vs the Colonies.mp4 | 1.44 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/13. The BSG Threat Hunting Team.mp4 | 473.04 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/14. Scenario 1 The Ambitious Lt Gaeta.mp4 | 133.66 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/15. Scenario 1 Web Application Attack.mp4 | 1.46 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/16. Recon Build a Targeted Wordlist.mp4 | 890.08 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/17. Mapping Web Server Located via Targeted DNS.mp4 | 1.05 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/18. Exploitation SQL Injection in Web Application.mp4 | 1.23 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/19. PostExploitation Data Exfiltration.mp4 | 3.08 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/20. Scenario 1 Web Application Attack Key Points.mp4 | 1.27 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/21. Scenario 2 Watering Hole ClientSide Pivot 1.mp4 | 856.60 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/22. Scenario 2 Watering Hole ClientSide Pivot 2.mp4 | 127.42 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/23. Scenario 2 Watering Hole ClientSide Pivot 3.mp4 | 976.49 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/24. Recon Watering Hole ID.mp4 | 2.83 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/25. Weaponization Watering Hole Established.mp4 | 1.84 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/26. Exploitation ClientSide Exploitation.mp4 | 279.06 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/27. PostExploitation C2 Establishment.mp4 | 1.51 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/28. Pivot Target Acquired.mp4 | 1.80 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/29. Goal Achieved Data Exfiltration.mp4 | 1.76 MB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/30. Scenario 2 ClientSide Pivot Key Points.mp4 | 115.86 KB |
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/31. Illustrations Applied.mp4 | 2.42 MB |
VoD 2020/2. Network Security Architecture/2. Routers/1. Course Roadmap.mp4 | 841.89 KB |
VoD 2020/2. Network Security Architecture/2. Routers/2. Routers.mp4 | 1.69 MB |
VoD 2020/2. Network Security Architecture/2. Routers/3. RouterBased Detection IPFIXNetFlow.mp4 | 10.88 MB |
VoD 2020/2. Network Security Architecture/2. Routers/4. IPFIXNetFlow Data.mp4 | 3.28 MB |
VoD 2020/2. Network Security Architecture/2. Routers/5. Profile Outbound Flows.mp4 | 12.01 MB |
VoD 2020/2. Network Security Architecture/2. Routers/6. Abnormal Outbound Connections.mp4 | 1.07 MB |
VoD 2020/2. Network Security Architecture/2. Routers/7. Persistent Outbound Connections.mp4 | 4.39 MB |
VoD 2020/2. Network Security Architecture/2. Routers/8. HighVolume Outbound Connections.mp4 | 8.46 MB |
VoD 2020/2. Network Security Architecture/2. Routers/9. Unexpected Destinations.mp4 | 21.35 MB |
VoD 2020/2. Network Security Architecture/2. Routers/10. Outbound Visualization.mp4 | 5.30 MB |
VoD 2020/2. Network Security Architecture/2. Routers/11. Routers Action Items.mp4 | 1.24 MB |
VoD 2020/2. Network Security Architecture/2. Routers/12. Routers vs Scenario 1 Web App Prevention.mp4 | 886.92 KB |
VoD 2020/2. Network Security Architecture/2. Routers/13. Routers vs Scenario 1 Web App Detection.mp4 | 1010.30 KB |
VoD 2020/2. Network Security Architecture/2. Routers/14. Routers vs Scenario 2 Client Prevention.mp4 | 2.17 MB |
VoD 2020/2. Network Security Architecture/2. Routers/15. Routers vs Scenario 2 Client Detection.mp4 | 792.22 KB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/1. Course Roadmap.mp4 | 8.35 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/2. Perimeter SI Firewalls.mp4 | 1.03 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/3. Understanding Stateful.mp4 | 3.40 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/4. Default Deny Inbound.mp4 | 9.50 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/5. Additional Layer 3 Inbound Filtering.mp4 | 11.09 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/6. Default Deny Outbound.mp4 | 2.36 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/7. Layer 3 Outbound Filtering.mp4 | 2.04 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/8. Layer 4 Outbound Filtering.mp4 | 19.28 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/9. SI Firewall vs Scenario 1 Web App Prevention.mp4 | 2.42 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/10. SI Firewall vs Scenario 1 Web App Detection.mp4 | 130.00 KB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/11. SI Firewall vs Scenario 2 Client Prevention.mp4 | 6.77 MB |
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/12. SI Firewall vs Scenario 2 Client Detection.mp4 | 3.07 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/1. Course Roadmap 1.mp4 | 1.54 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/2. CIS 1810 Deploy Web Application Firewalls.mp4 | 3.75 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/3. Web Application Firewalls.mp4 | 4.80 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/4. WAF Capabilities.mp4 | 7.05 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/5. WAF PreventionDetection.mp4 | 7.40 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/6. WAF Deployments.mp4 | 11.14 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/7. WAF vs Scenario 1 Web App Prevention.mp4 | 2.55 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/8. WAF vs Scenario 1 Web App Detection.mp4 | 3.27 MB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/9. WAF vs Scenario 2 Client PreventionDetection.mp4 | 315.74 KB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/10. Course Roadmap 2.mp4 | 122.76 KB |
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/11. SEC511 Workbook ModSecurity.mp4 | 51.55 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/1. Course Roadmap.mp4 | 1.77 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/2. Forward Proxies.mp4 | 3.19 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/3. Proxy or Bust.mp4 | 6.05 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/4. Proxy Configuration of Clients.mp4 | 6.17 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/5. WPAD.mp4 | 2.69 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/6. Web Content Filters.mp4 | 3.96 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/7. Blacklisting Billions.mp4 | 10.88 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/8. MIMEContentType BlockingAlerting.mp4 | 14.44 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/9. MIMEContentType Illustrated.mp4 | 1.68 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/10. Beyond Website Categorization.mp4 | 1.33 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/11. Splash Proxy.mp4 | 9.93 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/12. Forward Proxy vs Scenario 2 Client Prevention.mp4 | 2.96 MB |
VoD 2020/2. Network Security Architecture/5. Forward Proxies/13. Forward Proxy vs Scenario 2 Client Detection.mp4 | 1.28 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/1. Course Roadmap.mp4 | 119.47 KB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/2. Encrypt All the Things.mp4 | 3.56 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/3. Enterprise Responses to Outbound HTTPS Encryption.mp4 | 8.06 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/4. CIS 1210 Decrypt Network Traffic at Proxy.mp4 | 3.97 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/5. Decrypting HTTPS with InterceptionInspection.mp4 | 5.37 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/6. Never Decrypt All The Things.mp4 | 5.07 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/7. Encryption Beyond HTTPS.mp4 | 6.53 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/8. DNS over TLS DoT.mp4 | 9.56 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/9. DNS Over HTTPS DoH .mp4 | 7.74 MB |
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/10. DoH DNS Request.mp4 | 14.03 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/1. Course Roadmap.mp4 | 621.86 KB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/2. Network Intrusion Detection Systems NIDS.mp4 | 1.93 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/3. Perimeter NIDS Placement.mp4 | 4.54 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/4. Other NIDS Placement.mp4 | 6.50 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/5. NIDS Configuration.mp4 | 10.70 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/6. Invisibility Analysis IDS and Trust.mp4 | 1.03 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/7. IDS Trust Relationships Visualized.mp4 | 4.87 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/8. NIDS and Prevention.mp4 | 935.77 KB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/9. NIDS vs Scenario 1 Web Detection.mp4 | 3.39 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/10. NIDS vs Scenario 2 Client Detection 1.mp4 | 5.07 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/11. NIDS vs Scenario 2 Client Detection 2.mp4 | 3.11 MB |
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/12. NIDS Scenario 2 Detection FTW.mp4 | 6.06 MB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/1. Course Roadmap.mp4 | 122.83 KB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/2. Network Intrusion Prevention Systems NIPS.mp4 | 4.86 MB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/3. NIPS NGFW.mp4 | 8.06 MB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/4. NIPS and Detection vs Scenario 12.mp4 | 1.25 MB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/5. NIPS vs Scenario 1 Web App Prevention.mp4 | 745.97 KB |
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/6. NIPS vs Scenario 2 Client Prevention.mp4 | 679.98 KB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/1. Course Roadmap 1.mp4 | 547.35 KB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/2. NextGeneration Firewalls NGFW.mp4 | 1.16 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/3. Layer 7 Firewalling.mp4 | 3.09 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/4. SI vs NGFW Example.mp4 | 3.39 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/5. Application IdentificationInspection.mp4 | 16.93 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/6. OpenAppId.mp4 | 3.72 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/7. Another SI vs NGFW Scenario.mp4 | 6.88 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/8. User Visibility and Reputation.mp4 | 1.92 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/9. NGFW vs Scenario 1 Web App.mp4 | 787.11 KB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/10. NGFW vs Scenario 2 Client Prevention.mp4 | 2.80 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/11. NGFW vs Scenario 2 Client Detection.mp4 | 1.57 MB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/12. Course Roadmap 2.mp4 | 586.73 KB |
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4 | 48.82 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/1. Course Roadmap.mp4 | 4.91 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/2. Malware Detonation Devices.mp4 | 13.80 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/3. MDD Capabilities.mp4 | 7.53 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/4. Cuckoo Sandbox.mp4 | 4.26 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/5. Malwr.mp4 | 2.32 MB |
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4 | 7.73 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/1. Course Roadmap.mp4 | 157.25 KB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/2. A Word on Entropy.mp4 | 3.22 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/3. High Entropy Examples.mp4 | 5.20 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/4. Programmatic Entropy Analysis.mp4 | 2.12 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/5. ent Classic Entropy Analysis.mp4 | 7.81 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/6. Assessing ent.mp4 | 7.24 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/7. Bring Out the Baggett.mp4 | 13.60 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/8. Get Your freqpy On.mp4 | 2.62 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/9. freqteststring.mp4 | 1.85 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/10. freqing Awesome.mp4 | 16.86 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/11. Domain Generation Algorithms DGAs.mp4 | 6.28 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/12. DGA Beyond Domain Generation Algorithms.mp4 | 2.57 MB |
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/13. freqserverpy For freqing at Scale.mp4 | 7.25 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/1. Course Roadmap.mp4 | 460.64 KB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/2. Security Information and Event Management SIEM.mp4 | 6.94 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/3. Data Overload.mp4 | 2.97 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/4. SIEM Centralized Log Collection.mp4 | 2.88 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/5. DefineSIEM.mp4 | 2.97 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/6. Dual Stack SIEM Compliance Tactical.mp4 | 11.06 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/7. SIEMs Killer App Log Enrichment.mp4 | 4.95 MB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/8. SIEM and Prevention.mp4 | 301.51 KB |
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/9. SIEM and Detection.mp4 | 2.91 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/1. Course Roadmap.mp4 | 3.17 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/2. Adversary Deception Devices.mp4 | 2.10 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/3. HoneypotsHoneynets.mp4 | 1.18 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/4. Traditional Honeypots.mp4 | 3.60 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/5. Internal Listening Honeypots.mp4 | 7.27 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/6. HighValue Deception.mp4 | 2.13 MB |
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/7. Tactical Honeypots.mp4 | 6.99 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/1. Course Roadmap.mp4 | 2.00 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/2. Switches.mp4 | 4.26 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/3. IPFIXNetFlow.mp4 | 142.71 KB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/4. VLAN ACLs VACLs.mp4 | 4.69 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4 | 1.63 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/6. Private VLANs PVLANs.mp4 | 3.80 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/7. Potential Issues with Private VLANs.mp4 | 3.91 MB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/8. Internal SI Firewalls.mp4 | 959.56 KB |
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/9. SwitchInternal SI Firewall and Pivoting.mp4 | 4.03 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/1. Course Roadmap.mp4 | 793.63 KB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/2. Threat Intelligence.mp4 | 4.36 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/3. TTPs.mp4 | 2.24 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/4. Kill Chain Revisited.mp4 | 2.85 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/5. Indicator Identification.mp4 | 3.73 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/6. DetectRespond Lifecycle.mp4 | 10.60 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/7. Dirty Word List DWL.mp4 | 1020.77 KB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/8. IOCs.mp4 | 1.86 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/9. File and URL Analysis.mp4 | 1.88 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/10. VirusTotal.mp4 | 1.29 MB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/11. Evading AV or AllClear.mp4 | 636.38 KB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/12. URL Analysis.mp4 | 1020.74 KB |
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/13. Other FileURL Analysis.mp4 | 3.00 MB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/1. Course Roadmap 1.mp4 | 8.26 MB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/2. Day 2 Punch ListAction Items.mp4 | 47.51 MB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/3. Day 2 TLDR.mp4 | 21.37 MB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/4. Course Roadmap 2.mp4 | 120.58 KB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/5. SEC511 Workbook Honeytokens for Leak Detection.mp4 | 134.14 MB |
VoD 2020/2. Network Security Architecture/16. Section Two Summary/6. SEC511 Daily NetWars.mp4 | 56.04 KB |
VoD 2020/3. Network Security Monitoring/1. Getting Started/1. Network Security Monitoring.mp4 | 1.78 MB |
VoD 2020/3. Network Security Monitoring/1. Getting Started/2. Table of Contents 1.mp4 | 6.86 MB |
VoD 2020/3. Network Security Monitoring/1. Getting Started/3. Table of Contents 2.mp4 | 23.77 MB |
VoD 2020/3. Network Security Monitoring/1. Getting Started/4. Course Roadmap.mp4 | 118.83 KB |
VoD 2020/3. Network Security Monitoring/1. Getting Started/5. A Note on Exercises.mp4 | 3.34 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/1. Course Roadmap.mp4 | 163.27 KB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/2. What Is Network Security Monitoring.mp4 | 3.80 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/3. What Is Continuous Security Monitoring.mp4 | 7.15 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/4. Richard Bejtlich NSM versus CSM.mp4 | 2.13 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/5. Its More Complicated than Threats versus Vulnerabilities.mp4 | 2.92 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/6. Form a Threating Hunting Team.mp4 | 5.80 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/7. Good Hunting.mp4 | 15.17 MB |
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/8. Threat Hunting Team HowTo.mp4 | 4.30 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/1. Course Roadmap.mp4 | 481.39 KB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/2. Evolution of NSM.mp4 | 2.13 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/3. The Tao of Network Security Monitoring.mp4 | 2.73 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/4. NSM versus NIDS.mp4 | 1.52 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/5. Why Not Replace Detection with Prevention.mp4 | 2.11 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/6. DBIRMTrends Is Internal Detection Improving.mp4 | 6.37 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4 | 4.69 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/8. Case Study NotPetya.mp4 | 3.09 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/9. NotPetya Financial Cost.mp4 | 1.67 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/10. NotPetya Effects on Ukraine.mp4 | 1.28 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/11. NotPetya Effects on Maersk.mp4 | 1.32 MB |
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/12. Maersk Information Security Improvements.mp4 | 3.05 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/1. Course Roadmap.mp4 | 161.87 KB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/2. The NSM Toolbox.mp4 | 958.24 KB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/3. NSM Distribution.mp4 | 4.13 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/4. Security Onion.mp4 | 1.94 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/5. Security Onion Included Software.mp4 | 4.98 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/6. NSMNIDS Frontends.mp4 | 2.44 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/7. Sguil in Action I.mp4 | 5.56 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/8. Sguil in Action II.mp4 | 7.57 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/9. Sguil in Action III.mp4 | 11.22 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/10. NSM Toolbox Wireshark and Tshark.mp4 | 4.07 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/11. Wireshark.mp4 | 13.58 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/12. Tshark.mp4 | 6.02 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/13. NSM Toolbox NIDS.mp4 | 519.15 KB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/14. Bro Zeek.mp4 | 2.27 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/15. Origin of Zeek.mp4 | 1.51 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/16. ZeekBro Network Security Monitor.mp4 | 1.17 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/17. Example Difference between SnortSuricata and ZeekBro.mp4 | 18.82 MB |
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/18. NSM Toolbox SIEMs.mp4 | 2.63 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/1. Course Roadmap.mp4 | 1.21 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/2. Fundamental NIDS Design.mp4 | 1.50 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/3. Signature Matching.mp4 | 3.29 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/4. How Much Malware Is There.mp4 | 4.99 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/5. Blacklisting Is a Failed Approach.mp4 | 1.40 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/6. How Difficult Is Signature Evasion.mp4 | 1.78 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/7. Answer Not Many.mp4 | 163.62 KB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/8. Protocol Behavior.mp4 | 7.03 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/9. Anomaly Detection.mp4 | 7.75 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/10. Historical Anomaly Design.mp4 | 974.77 KB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/11. Detecting Specific Anomalies.mp4 | 2.24 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/12. Know Thy Network.mp4 | 6.77 MB |
VoD 2020/3. Network Security Monitoring/5. NIDS Design/13. There Is No Easy Button.mp4 | 876.94 KB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/1. Course Roadmap.mp4 | 4.76 MB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/2. Analysis Methodology.mp4 | 5.42 MB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/3. Sherlock Holmes on Deduction.mp4 | 1.94 MB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/4. How This Applies to NSM.mp4 | 6.14 MB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/5. NSM Analysis Methodology.mp4 | 1.43 MB |
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/6. Dirty Word List.mp4 | 1.56 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/1. Course Roadmap 1.mp4 | 161.68 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/2. NSM Data Sources 1.mp4 | 1.86 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/3. NSM Data Sources 2.mp4 | 465.07 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/4. Packet Data.mp4 | 3.09 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/5. Full Packet Capture.mp4 | 2.64 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/6. Storage Required for Full Packet Capture.mp4 | 1.75 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/7. Full Packet Capture Tools.mp4 | 2.22 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/8. Extracted Data.mp4 | 5.91 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/9. Carving Files with Wireshark Step 1 Identify the File.mp4 | 4.02 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/10. Step 2 Choose the Conversation and Save As.mp4 | 1.46 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/11. Edit the File.mp4 | 2.20 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4 | 3.70 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/13. Or Use ZeekBro.mp4 | 3.98 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/14. String Data.mp4 | 2.81 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/15. Pcap Strings Example.mp4 | 4.54 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/16. Flow Data.mp4 | 3.00 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/17. Pcap Flow Example Using Tshark.mp4 | 1.84 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/18. Transaction Data.mp4 | 1.46 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/19. Transaction Data Example.mp4 | 8.09 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/20. Statistical Data.mp4 | 586.58 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/21. Alert Data.mp4 | 1.26 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/22. Example Sguil IDS Alert.mp4 | 2.65 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/23. Tagged Data.mp4 | 1.49 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/24. SnortSourcefire Tagging Syntax.mp4 | 2.09 MB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/25. Example of a Tagged Rule.mp4 | 470.90 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/26. Correlated Data.mp4 | 998.45 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/27. Course Roadmap 2.mp4 | 463.07 KB |
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4 | 174.25 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/1. Course Roadmap.mp4 | 498.96 KB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/2. Practical NSM Issues.mp4 | 857.87 KB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/3. NSM Sensors and Servers.mp4 | 2.12 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/4. Security Onion ServerSensor Design.mp4 | 6.23 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/5. Practical Issues How to Sniff.mp4 | 1.17 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/6. Hubs.mp4 | 2.99 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/7. Mirror Ports.mp4 | 7.58 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/8. Network Taps.mp4 | 5.06 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/9. Port Overload.mp4 | 1.62 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/10. Sniffing Virtual Traffic.mp4 | 1.86 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/11. NSM Sensor Placement.mp4 | 66.45 KB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/12. Umbrella Sensor.mp4 | 3.66 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/13. Sensor Placement.mp4 | 8.91 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/14. Practical Issues NTP.mp4 | 3.97 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/15. Practical Issues Time Zones and Daylight Saving Time.mp4 | 4.05 MB |
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/16. Spring Time Difference Between NYC London and Sydney 1.mp4 | 114.23 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/1. Course Roadmap 1.mp4 | 779.84 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/2. Cornerstone NSM.mp4 | 363.10 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/3. ClientSide Exploits.mp4 | 1.32 MB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/4. ClientSide Example.mp4 | 448.82 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/5. ServiceSide Exploits.mp4 | 2.44 MB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/6. ServiceSide Example.mp4 | 964.04 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/7. Course Roadmap 2.mp4 | 757.59 KB |
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/8. SEC511 Workbook Sguil ServiceSide Analysis.mp4 | 137.44 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/1. Course Roadmap.mp4 | 2.07 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/2. Tracking EXEs 1.mp4 | 1.96 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/3. Why Is This Important.mp4 | 1.01 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/4. Stage 2 EXE.mp4 | 3.66 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/5. Tracking EXEs 2.mp4 | 1.96 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/6. Identifying Windows EXEs.mp4 | 4.19 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/7. This Program Must Be Run under Win32.mp4 | 2.95 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/8. What Is Wrong with This Picture.mp4 | 6.95 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/9. Spot the Anomaly.mp4 | 650.02 KB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/10. CIS 12 Boundary Defense.mp4 | 1.18 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/11. Predictable Transfer of EXEs.mp4 | 2.70 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/12. Defensible Executable Transfers.mp4 | 1.28 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/13. How EXEs Should Not Move.mp4 | 3.53 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/14. NonDefensible and Suspicious Executable Flow.mp4 | 1.12 MB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/15. Detecting Stage 2 Downloads.mp4 | 537.90 KB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/16. AnomalyBased Detection Is Hard Right.mp4 | 665.73 KB |
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/17. Targeted AnomalyBased EXE Rule.mp4 | 7.02 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/1. Course Roadmap.mp4 | 756.46 KB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/2. Identifying Command and Control Traffic.mp4 | 3.20 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/3. Malware Phones Home.mp4 | 6.14 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/4. Unencrypted pLagUe Botnet C2 Traffic.mp4 | 2.99 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/5. Persistent External Network Connections.mp4 | 3.94 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/6. Inventory Persistent External Connections.mp4 | 2.04 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/7. Three Categories Will Emerge.mp4 | 2.91 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/8. C2 Protocols.mp4 | 3.62 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/9. ICMP.mp4 | 1.91 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/10. Wireshark ICMP Example.mp4 | 470.28 KB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/11. SSH Tunneled via ICMP.mp4 | 2.45 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/12. Whitecap One Approach to Detect Malicious ICMP.mp4 | 13.38 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/13. Spot the C2.mp4 | 4.86 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/14. DNS The Ideal C2 Channel.mp4 | 4.62 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/15. Zeus Botnet C2 via DNS.mp4 | 6.34 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/16. dnscat2 and Iodine.mp4 | 4.13 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/17. dnscat2 Wireshark View.mp4 | 14.31 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/18. dnscat2 Whats Happening.mp4 | 1.59 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/19. dnscat2 Spotting with ZeekBro.mp4 | 1.03 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/20. dnscat2 The Results.mp4 | 1.11 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/21. Iodine Raw Tunnel.mp4 | 2.63 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/22. Iodine DNS Tunneling.mp4 | 7.03 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/23. Iodine Show Me the NULL ZeekBro.mp4 | 1.01 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/24. HTTP C2.mp4 | 2.44 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/25. HTTP POST C2.mp4 | 3.17 MB |
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/26. C2 POST Content.mp4 | 3.22 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/1. Course Roadmap.mp4 | 728.79 KB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/2. Tracking User Agents 1.mp4 | 2.67 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/3. Common User Agent Substrings.mp4 | 2.32 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/4. Windows Versions in User Agent Strings.mp4 | 2.89 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/5. Abnormal HTTP User Agents.mp4 | 3.28 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/6. Tracking User Agents 2.mp4 | 3.16 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/7. Our Approach on the Contagio Crimeware Pcap Collection.mp4 | 6.85 MB |
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/8. Another Method Identify the Shortest UserAgents.mp4 | 2.27 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/1. Course Roadmap.mp4 | 821.58 KB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/2. C2 via HTTPS.mp4 | 742.91 KB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/3. NonEncrypted HTTPS 1.mp4 | 2.27 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/4. NonEncrypted HTTPS 2.mp4 | 1.75 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/5. SSLTLS without HTTPS.mp4 | 2.84 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/6. The HTTPS SSLTLS Handshake.mp4 | 1.65 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/7. Normal HTTPS.mp4 | 2.88 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/8. Malicious HTTPS.mp4 | 1016.46 KB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/9. Follow TCP Stream.mp4 | 2.86 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/10. Tor C2.mp4 | 1.49 MB |
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/11. Tor HTTPS.mp4 | 942.57 KB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/1. Course Roadmap.mp4 | 1014.04 KB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/2. Tracking Encryption Certificates.mp4 | 1.81 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/3. Public Key Certificates.mp4 | 1.37 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/4. Spot the Difference.mp4 | 3.31 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/5. Example X509 Certificate.mp4 | 1.71 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/6. Normal X509 issuer Fields.mp4 | 1.03 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/7. Detecting Malware.mp4 | 8.01 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/8. A Simple Approach to Detecting Malware via Certificates.mp4 | 3.89 MB |
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/9. Our Approach on the Contagio Crimeware Pcap Collection.mp4 | 276.78 KB |
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/1. Course Roadmap.mp4 | 117.53 KB |
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/2. Day 3 Punch ListAction Items.mp4 | 39.39 MB |
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/3. SEC511 Workbook 5113 Final Exercise.mp4 | 66.19 MB |
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/4. SEC511 Daily NetWars.mp4 | 56.19 KB |
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/5. Thank you.mp4 | 71.98 KB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/1. Endpoint Security Architecture 1.mp4 | 21.58 MB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/2. Table of Contents 1.mp4 | 63.22 MB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/3. Table of Contents 2.mp4 | 76.45 KB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/4. Course Roadmap.mp4 | 140.94 KB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/5. Endpoint Security Architecture 2.mp4 | 4.26 MB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/6. CIS Controls Critical Security Controls.mp4 | 5.59 MB |
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/7. First Five CIS Controls.mp4 | 3.99 MB |
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/1. Course Roadmap.mp4 | 138.46 KB |
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/2. What We Cover.mp4 | 605.55 KB |
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/3. Endpoints More Than Windows.mp4 | 6.28 MB |
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/4. Endpoints More Than Desktops.mp4 | 7.79 MB |
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/5. Endpoints Beyond DesktopsServers.mp4 | 2.16 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/1. Course Roadmap.mp4 | 584.09 KB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/2. Patching.mp4 | 3.02 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/3. Patch Timeline Metrics.mp4 | 19.55 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/4. Nation States 0days and APT Oh My.mp4 | 4.95 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/5. To Test or Not to Test.mp4 | 5.46 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/6. Patch Rinse Repeat.mp4 | 2.90 MB |
VoD 2020/4. Endpoint Security Architecture/3. Patching/7. Modern Patching Challenges.mp4 | 2.18 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/1. Course Roadmap.mp4 | 136.29 KB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/2. Shadow Brokers Patching Hardening.mp4 | 2.75 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/3. Foreverday 0day.mp4 | 8.03 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/4. SMBv1 and the West Coast Hippy Lifestyle.mp4 | 4.65 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/5. CIS 51 Secure Baseline Configuration.mp4 | 4.70 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/6. Building a Baseline Config.mp4 | 1.52 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/7. How NOT to Build a Config.mp4 | 3.77 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/8. Center for Internet Security.mp4 | 3.75 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/9. CIS Benchmarks.mp4 | 1.54 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/10. Vendor Guides.mp4 | 1022.66 KB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/11. Microsoft Security Compliance Toolkit SCT.mp4 | 2.36 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/12. Beyond Vendors and CIS.mp4 | 1.21 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/13. Configuration Change Monitoring.mp4 | 3.14 MB |
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/14. Baseline Monitoring.mp4 | 8.41 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/1. Course Roadmap.mp4 | 692.90 KB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/2. CIS 83 EnableDeploy AntiExploitation Technologies.mp4 | 941.26 KB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/3. EMET.mp4 | 8.81 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/4. RIP EMET.mp4 | 5.84 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/5. EMET Features.mp4 | 3.64 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/6. EMET Configuration GUI.mp4 | 5.53 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/7. Windows Defender Exploit Guard WDEG.mp4 | 1.79 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4 | 11.11 MB |
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4 | 1.81 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/1. Course Roadmap 1.mp4 | 2.96 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/2. Application Monitoring.mp4 | 1.38 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/3. Log Full Command Line of All Processes.mp4 | 7.02 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/4. Security Event ID 4688.mp4 | 8.37 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/5. Command Lines to Look For.mp4 | 2.49 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/6. Meterpreter Payload Not So Normal.mp4 | 17.73 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/7. PowerShell Logging.mp4 | 878.33 KB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/8. Microsoft Sysinternals Sysmon.mp4 | 1.15 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/9. Sysmon Application Monitoring.mp4 | 6.22 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/10. Sysmon Capabilities.mp4 | 8.87 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/11. Sysmon Syntax.mp4 | 2.74 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/12. Example Sysmon XML Configuration.mp4 | 18.70 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/13. IMPHASH Hash.mp4 | 8.13 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/14. Sysmon Event Filtering.mp4 | 4.03 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/15. Sysmon Event Filtering II.mp4 | 1.97 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4 | 6.11 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/17. BeltandSuspenders Detective Whitelisting Process.mp4 | 8.43 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/18. DeepWhite.mp4 | 4.13 MB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/19. Course Roadmap 2.mp4 | 145.43 KB |
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/20. SEC511 Workbook Sysmon.mp4 | 139.32 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/1. Course Roadmap.mp4 | 1.32 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/2. CIS 27 Utilize Application Whitelisting.mp4 | 754.42 KB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/3. Application Whitelisting.mp4 | 669.51 KB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/4. Application not file Whitelist.mp4 | 4.88 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/5. The Whitelist.mp4 | 12.40 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/6. Whitelist Integrity.mp4 | 2.14 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/7. Typical Flow of Executables.mp4 | 1.36 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/8. Acquiring Innocuous Binaries.mp4 | 1.84 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/9. Evil Executable Propagation.mp4 | 1.32 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/10. Identification of Source.mp4 | 12.69 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/11. ZoneIdentifier.mp4 | 1.26 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/12. Whitelisting Administrative Overhead.mp4 | 5.27 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/13. Phase 0 Whitelist Building.mp4 | 555.37 KB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/14. NSRL RDS Reference Dataset.mp4 | 2.73 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/15. FieldedSystem Executables.mp4 | 5.03 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/16. PreFielded System Executables.mp4 | 2.58 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/17. Trusting Signed Binaries by Specific Vendors.mp4 | 2.85 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4 | 1.18 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/19. Hybrid Approach.mp4 | 2.86 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/20. Phase 1 Targeted Detection.mp4 | 4.36 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/21. TrueFalse Positive.mp4 | 2.67 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/22. Phase 1 Duration.mp4 | 1.18 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/23. Phase 2 Strict Enforcement.mp4 | 2.57 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/24. Blocking Detection.mp4 | 4.00 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/25. Trusted Binaries.mp4 | 1.04 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/26. Previously Trusted Binaries.mp4 | 3.36 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/27. Hash Bypass.mp4 | 2.72 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/28. Arent advanced attackers moving towards code and DLL injection.mp4 | 1.50 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/29. Advanced Application Whitelisting.mp4 | 1023.16 KB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/30. Linux AppArmor.mp4 | 1.07 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/31. Software Restriction Policies.mp4 | 2.27 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/32. AppLocker.mp4 | 1.46 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/33. AppLocker Phase 0 Rule Creation.mp4 | 3.82 MB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/34. AppLocker Phase 1 Audit Only.mp4 | 554.62 KB |
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/35. Audit Only Mode.mp4 | 286.62 KB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/1. Course Roadmap.mp4 | 3.72 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/2. Inevitable Exploitation.mp4 | 3.62 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/3. Adversary Privilege.mp4 | 2.27 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/4. Privileged Accounts.mp4 | 280.54 KB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/5. Administrative Accounts.mp4 | 1.67 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/6. How Many Administrative Accounts.mp4 | 4.06 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/7. What Does Admin Mean.mp4 | 4.23 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/8. RightsPermissions.mp4 | 2.55 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/9. Builtin Administrator.mp4 | 11.66 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/10. Builtin Administrator Passwords.mp4 | 3.73 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/11. Local Administrator Password Solution LAPS.mp4 | 9.95 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/12. Service Accounts.mp4 | 11.16 MB |
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/13. LSA Secrets.mp4 | 3.95 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/1. Course Roadmap 1.mp4 | 515.70 KB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/2. Privileged Account Monitoring.mp4 | 2.34 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/3. NTFS Permissions.mp4 | 1.89 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/4. exploitwindowslocalservicepermissions.mp4 | 3.68 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/5. User Rights and Privileges.mp4 | 5.42 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/6. Key User Rights.mp4 | 2.24 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/7. Key Privileges.mp4 | 11.32 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/8. Persistence.mp4 | 4.28 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/9. ASEPs.mp4 | 2.25 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/10. Autoruns.mp4 | 1.93 MB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/11. Course Roadmap 2.mp4 | 134.49 KB |
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/12. SEC511 Workbook Autoruns.mp4 | 103.94 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/1. Course Roadmap.mp4 | 2.22 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/2. Reducing Privileges.mp4 | 5.73 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/3. UAC Less Privilege Is More Security.mp4 | 4.64 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/4. But Im an Admin.mp4 | 4.57 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/5. Loser PowerShell.mp4 | 836.99 KB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/6. Admin Unelevated PowerShell.mp4 | 4.70 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/7. Admin Elevated PowerShell.mp4 | 5.98 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/8. Magic Local Admin.mp4 | 1.40 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/9. No More UAC Bypassing Magic Admin.mp4 | 1.00 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/10. Process Monitor.mp4 | 11.93 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/11. Process Monitor Access Denied.mp4 | 618.88 KB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/12. Application Compatibility Toolkit ACT.mp4 | 3.42 MB |
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/13. LUA Buglight.mp4 | 1.16 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/1. Course Roadmap.mp4 | 4.01 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/2. Authentication.mp4 | 1.41 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/3. Passwords.mp4 | 1.38 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/4. Password ReuseSynchronization.mp4 | 7.31 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/5. Windows Password Hashes.mp4 | 1.45 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/6. Windows A Low Sodium Architecture.mp4 | 9.44 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/7. No Salt Illustrated.mp4 | 8.57 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/8. LMLaMe.mp4 | 12.00 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/9. Is LM Finally behind Us.mp4 | 2.63 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/10. NT.mp4 | 5.22 MB |
VoD 2020/4. Endpoint Security Architecture/11. Authentication/11. Password Storage.mp4 | 5.84 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/1. Course Roadmap.mp4 | 665.88 KB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/2. Security Support Provider SSP.mp4 | 4.65 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/3. SSP Impact of Single SignOn.mp4 | 3.81 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/4. SSP WDigest.mp4 | 3.72 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/5. WDigest FAIL.mp4 | 830.39 KB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/6. Microsoft Live Accounts LiveSSP.mp4 | 1.38 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/7. Microsoft Account Password Lengths and Truncation.mp4 | 12.33 MB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/8. Lets Try That Again.mp4 | 651.80 KB |
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/9. LiveSSP FAIL.mp4 | 3.85 MB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/1. Course Roadmap.mp4 | 669.39 KB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/2. PostAuthentication.mp4 | 2.47 MB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/3. Logon Types.mp4 | 3.47 MB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/4. Access Tokens.mp4 | 4.25 MB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/5. Token Impersonation Levels.mp4 | 1.26 MB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/6. Impersonate Tokens.mp4 | 601.71 KB |
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/7. Delegate Tokens.mp4 | 5.02 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/1. Course Roadmap.mp4 | 541.01 KB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/2. PasstheHash.mp4 | 8.23 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/3. Token Smuggling Pass the Session.mp4 | 3.86 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/4. Pass the Password.mp4 | 3.49 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/5. Mandiant MTrends on Mimikatz.mp4 | 1.71 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/6. The Sed Persistent Threat SPT.mp4 | 5.97 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/7. This Dog Can Hunt.mp4 | 904.27 KB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/8. WhackaMole.mp4 | 758.79 KB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4 | 2.53 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/10. Advanced Authentication Attack Mitigations.mp4 | 17.91 MB |
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/11. MultiFactor Authentication MFA.mp4 | 3.70 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/1. Course Roadmap 1.mp4 | 1.99 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/2. Endpoint Protection Platforms EPP.mp4 | 14.63 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/3. EPP AntivirusAntimalware.mp4 | 3.19 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/4. EPP HostBased Firewall CIS 94.mp4 | 192.02 KB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/5. Windows Defender Firewall.mp4 | 4.75 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/6. Default WDFAS.mp4 | 1.18 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/7. Not Windows Defender Firewall.mp4 | 2.55 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/8. Course Roadmap 2.mp4 | 138.95 KB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/9. ASD Mitigation Strategy HostBased IDS.mp4 | 1.27 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/10. HostBased IDS.mp4 | 3.63 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/11. Gains from HIDS.mp4 | 1.45 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/12. Approaches to HIDS.mp4 | 1.98 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/13. Detection without Response.mp4 | 4.58 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/14. ASD Mitigation Strategy Endpoint Detection and Response.mp4 | 2.21 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/15. Endpoint Detection and Response EDR.mp4 | 9.88 MB |
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/16. Host Detection without HIDSEDR.mp4 | 2.24 MB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/1. Course Roadmap 1.mp4 | 41.24 MB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/2. Day 4 Punch ListAction Items.mp4 | 113.02 KB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/3. Day 4 TLDR.mp4 | 114.40 KB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/4. Course Roadmap 2.mp4 | 144.54 KB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/5. SEC511 Workbook AppLocker.mp4 | 52.73 MB |
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/6. SEC511 Daily NetWars.mp4 | 56.33 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/1. Automation and Continuous Security Monitoring.mp4 | 16.87 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/2. Table of Contents 1.mp4 | 52.77 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/3. Table of Contents 2.mp4 | 78.89 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/4. Course Roadmap.mp4 | 132.62 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/5. What Is Continuous Security Monitoring.mp4 | 3.11 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/6. Acronym Soup.mp4 | 2.84 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/7. The US Government and Continuous Monitoring.mp4 | 1.01 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/8. DoD Risk Management Framework.mp4 | 9.93 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/9. Bejtlich on RMF.mp4 | 7.05 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/10. Department of Homeland Securitys CDM.mp4 | 10.69 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/11. Bejtlich on CDM.mp4 | 709.22 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/12. NIST SP 800137.mp4 | 814.44 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/13. NIST Special Publication 800137.mp4 | 1.04 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/14. NIST SP 800137 Automation Domains.mp4 | 17.51 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/15. NIST SP 800137 What to Do Not How to Do It.mp4 | 610.36 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4 | 3.55 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/17. The US Governments Take on CSM Lessons Learned.mp4 | 2.72 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/18. Our Approach to CSM.mp4 | 1.42 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/1. Course Roadmap.mp4 | 575.60 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/2. Industry Best Practices.mp4 | 4.00 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/3. CIS Controls.mp4 | 3.20 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/4. ASD Strategies to Mitigate Cyber Security Incidents.mp4 | 2.16 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/5. Top 4 Mitigation Strategies.mp4 | 10.02 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4 | 8.51 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/7. ASD Essential Eight Limit Extent of Incidents.mp4 | 719.79 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/8. ASD Essential Eight Recover Data and System Availability.mp4 | 2.34 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/9. The ASD Top 4 Focus on Prevention.mp4 | 2.21 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/10. ASD Mitigation Strategies to Detect and Respond.mp4 | 14.69 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/1. Course Roadmap.mp4 | 562.92 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/2. Winning CSM Techniques.mp4 | 435.71 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/3. Monitoring a NonDefensible Network.mp4 | 11.65 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/4. Focus on Critical Systems and Data.mp4 | 7.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/5. FIPS 199 on SBU Classification.mp4 | 1.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/6. Data Classification HowTo.mp4 | 3.31 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/7. High Data in All the Wrong Places.mp4 | 5.64 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/8. Protect High Data.mp4 | 2.12 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/9. Windows Data Classification Tools.mp4 | 9.43 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/10. Detecting Change.mp4 | 916.21 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/11. Solve Problems as They Are Discovered.mp4 | 3.77 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/12. The Broken Windows Theory.mp4 | 6.47 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/13. Broken Windows Theory of Defensible Networks.mp4 | 2.25 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/14. Key CSM Technique Long Tail Analysis.mp4 | 2.39 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/15. The Long Tail 1.mp4 | 18.54 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/16. Lets Try Long Tail Analysis on Windows Security Logs.mp4 | 50.81 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/17. The Long Tail 2.mp4 | 72.41 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/1. Course Roadmap.mp4 | 135.71 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/2. Maintaining Situational Awareness.mp4 | 9.80 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/3. Useful Sites.mp4 | 1.23 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/1. Course Roadmap 1.mp4 | 1.13 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/2. Know Thy Software.mp4 | 1.64 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/3. Cant Secure What You Dont Have or Dont Know You Have.mp4 | 1.94 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/4. Inventory and Control of Hardware Assets.mp4 | 475.23 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/5. Inventories.mp4 | 2.20 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/6. Asset Inventory.mp4 | 1.67 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/7. Host Port and Service Discovery.mp4 | 1.82 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/8. Active Scanning.mp4 | 748.02 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/9. Always Test.mp4 | 10.21 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/10. Nmap.mp4 | 1.26 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/11. Ndiff.mp4 | 2.62 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/12. Course Roadmap 2.mp4 | 135.96 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/13. SEC511 Workbook Inventory.mp4 | 27.74 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/1. Course Roadmap 1.mp4 | 6.05 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/2. Passive Host Discovery.mp4 | 11.60 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/3. Passive Scanning.mp4 | 4.57 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/4. p0f version 3.mp4 | 6.28 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/5. PRADS.mp4 | 3.63 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4 | 806.89 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/7. Lets Clean That Up a Bit.mp4 | 455.19 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/8. CleanedUp Output.mp4 | 1.58 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/9. Course Roadmap 2.mp4 | 119.55 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/10. SEC511 Workbook p0f v3.mp4 | 31.04 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/1. Course Roadmap.mp4 | 134.25 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/2. Vulnerability Scanning.mp4 | 4.64 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/3. CIS 31 Vulnerability Scanning.mp4 | 4.43 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/4. Security Content Automation Protocol SCAP.mp4 | 3.08 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/5. OpenVAS.mp4 | 3.25 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/6. VulnWhisperer.mp4 | 6.00 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/1. Course Roadmap.mp4 | 2.56 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/2. Monitoring Patching.mp4 | 888.17 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/3. Standalone Microsoft Patch Scanning.mp4 | 3.42 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/4. GetMissingUpdates.mp4 | 2.28 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/5. Linux Patch Compliance.mp4 | 4.25 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/6. Quick and Dirty Linux Patch Checks.mp4 | 4.86 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/1. Course Roadmap.mp4 | 602.06 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/2. Monitoring Service Logs.mp4 | 7.16 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/3. CIS 87 Malware Defenses.mp4 | 1.10 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/4. Check Your DNS.mp4 | 3.03 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/5. Enable DNS Query Logging on Windows 20082012.mp4 | 3.23 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/6. DNS Analytical Logging on Windows 2012R2.mp4 | 7.25 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/7. Enable Query Logging on Bind 9.mp4 | 484.61 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/8. Enable Response Logging on Bind 9.mp4 | 1.99 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/9. Now Were Logging DNS Whats Next.mp4 | 10.37 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/10. DNS over HTTPS DoH and DNS over TLS DoT.mp4 | 1.53 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/11. DoH and DoT.mp4 | 1.74 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/12. FirefoxDoH.mp4 | 5.47 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/13. ChromeDoH.mp4 | 4.08 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/1. Course Roadmap.mp4 | 918.40 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/2. Monitoring Change in Critical Devices and Appliances.mp4 | 1.72 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/3. Two Approaches to Detect Device Change.mp4 | 2.13 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/4. BuiltIn Change Detection Cisco Routers.mp4 | 2.29 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/5. HowTo Configuration Change Notification and Logging.mp4 | 505.48 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/1. Course Roadmap.mp4 | 770.38 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/2. Leveraging Proxy and Firewall Data.mp4 | 1.67 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/3. CIS 129 Boundary Defense.mp4 | 644.85 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/4. Mandatory Proxies.mp4 | 1.83 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/5. Proxies Rule.mp4 | 2.96 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/6. Behavioral Proxy Checks.mp4 | 3.74 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/7. Case Study Naked Downloads.mp4 | 2.23 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/8. Proxies Allow Easy Detection of C2.mp4 | 2.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/9. Leveraging Firewall Logs.mp4 | 2.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/10. CIS 6 Audit Logs.mp4 | 1.69 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/11. Bots Love Spam.mp4 | 11.53 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/12. Which Outbound Ports to BlockLogAlert.mp4 | 2.23 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/1. Course Roadmap 1.mp4 | 462.64 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/2. Monitoring Critical Windows Events.mp4 | 6.78 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/3. Windows Event Log Locations.mp4 | 5.36 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/4. Damaged Windows Event Logs.mp4 | 3.49 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/5. Viewing Windows Security Event Logs.mp4 | 1.58 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/6. Exporting Event Logs.mp4 | 1.33 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/7. Critical Windows Event to Monitor.mp4 | 4.83 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/8. Detecting Malice via Windows Events.mp4 | 1.14 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/9. Critical Event 1 CommandLine Auditing.mp4 | 3.84 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/10. Local View Meterpreter Payload.mp4 | 10.19 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/11. Critical Event 2 Service Creation.mp4 | 1.39 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/12. Event IDs 7045 and 4697 normal Service Creation.mp4 | 1.94 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/13. Attacker Uses Metasploit PsExec Exploit.mp4 | 6.81 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/14. How Does This Differ from Normal PsExec.mp4 | 1.20 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4 | 3.92 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/16. System Event ID 7030 Track Errors.mp4 | 1.61 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/17. A Word on Scripting and Automation.mp4 | 1.35 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/18. Critical Event 3 User Creation.mp4 | 2.83 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/19. Event Viewer Security Log View net user sec511 sekrit add.mp4 | 1.99 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/20. Critical Event 4 Adding Users to Privileged Groups.mp4 | 2.43 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4 | 773.96 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/22. Tracking Changes to Domain Groups.mp4 | 1.00 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/23. Critical Event 5 Clearing Event Logs.mp4 | 4.69 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/24. Critical Event 6 Terminal Services Certificate Creation.mp4 | 2.17 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/25. Event Viewer System Log View.mp4 | 2.81 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/26. Critical Event 7 External Media Detection.mp4 | 3.07 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/27. Event Viewer System Log View New USB Drive.mp4 | 2.43 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/28. Critical Event 8 Disabling the Firewall.mp4 | 2.80 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/29. Event Viewer View Disabling the Firewall.mp4 | 1.85 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/30. Adding Specific Firewall Rules.mp4 | 2.25 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/31. Critical Event 9 Detecting Lateral Movement.mp4 | 10.02 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/32. Use of Local versus Domain Credentials.mp4 | 2.87 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/33. Track the Use of Local Credentials via the Network.mp4 | 7.52 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/34. PasstheHash Detection.mp4 | 1.61 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/35. Attacker View Metasploit PsExec PasstheHash 1.mp4 | 8.44 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/36. Attacker View Metasploit PsExec PasstheHash 2.mp4 | 763.74 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/37. Didnt Microsoft Fix This.mp4 | 7.83 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/38. PasstheHash and Lateral Movement Mitigation.mp4 | 1.83 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/39. Critical Event 10 AppLocker Alerts.mp4 | 1.36 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/40. Critical Event 11 EMET Alerts.mp4 | 1.18 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/41. Summary Critical Windows Events to Monitor.mp4 | 1.65 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/42. Course Roadmap 2.mp4 | 1.07 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/43. SEC511 Workbook Windows Event Logs.mp4 | 38.44 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/1. Course Roadmap.mp4 | 2.47 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/2. Importance of Automation.mp4 | 2.52 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/3. Automation Example Windows Startup Registry Keys.mp4 | 1.67 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/4. What Does a Malicious Startup Registry Key Look Like.mp4 | 1.15 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/5. Windows Registry Startup Keys.mp4 | 2.54 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/6. Remotely Accessing Registry Keys.mp4 | 855.80 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/7. Example PowerShell Script.mp4 | 2.29 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/8. Next Step Long Tail Analysis.mp4 | 4.08 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/9. Then Automate.mp4 | 1.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/10. DeepBlueCLI.mp4 | 6.11 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/11. DeepBlueCLI Partial List of Detected Events.mp4 | 2.43 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/12. DeepBlueCLI Regex Matching Command Lines.mp4 | 1.65 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/13. DeepBlueCLI Whitelist.mp4 | 1.62 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/14. DeepBlue CLI Base64 andor Compressed Commands.mp4 | 1.16 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/15. Use Case Petya.mp4 | 1.29 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/16. Use Case SamSam Spreading via WMI and PsExec.mp4 | 2.55 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/17. Test PowerShell Command.mp4 | 6.84 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4 | 2.23 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/1. Course Roadmap.mp4 | 1.06 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/2. PostIntrusion Detection.mp4 | 1.96 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/3. Memory Analysis.mp4 | 2.80 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/4. Redline.mp4 | 2.76 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/5. Kansa Go BigWide or Go Home.mp4 | 6.71 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/1. Course Roadmap.mp4 | 1.33 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/2. Day 5 Punch ListAction Items.mp4 | 26.34 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/3. SEC511 Workbook Persistence and Pivoting.mp4 | 75.73 MB |
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/4. SEC511 Daily NetWars.mp4 | 56.82 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/5. Thank You.mp4 | 65.34 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/1. Appendix Centralize Windows Event Logs MBSA.mp4 | 137.98 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/2. Configuring Centralized Windows Event Log Collection.mp4 | 104.82 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/3. Collectors and Sources.mp4 | 110.22 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/4. Configuring Centralized Logging 1.mp4 | 114.30 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/5. Configuring Centralized Logging 2.mp4 | 101.61 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/6. Create Two Groups.mp4 | 111.79 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/7. Add Computers to Groups.mp4 | 114.49 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/8. Windows Remote Management.mp4 | 91.67 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/9. Enable the Windows Event Collector.mp4 | 91.55 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/10. Creating the Subscription in Event Viewer.mp4 | 82.00 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/11. Choose Events.mp4 | 75.88 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/12. Complete Subscription.mp4 | 93.15 KB |
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/13. Default Windows Vista and Newer Settings.mp4 | 85.92 KB |
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/1. Section 6 Capstone Design Detect Defend.mp4 | 4.36 MB |
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/2. Capstone Overview.mp4 | 52.76 MB |
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4 | 1206.56 MB |
No trackers found |
TorrentBank
Copyright © 2024