SEC511 - Continuous Monitoring and Security Operations - TorrentBank

File Name:SEC511 - Continuous Monitoring and Security Operations

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:22.44 GB

File Count:972

File Hash:801551349d5128e4d81696d098b7a6f27b40934d

Magnet Link:

Magnet Link:

Torrent File:

MP3 2020/SEC511_1A_E01.mp3 69.86 MB
MP3 2020/SEC511_1B_E01.mp3 66.79 MB
MP3 2020/SEC511_1C_E01.mp3 58.52 MB
MP3 2020/SEC511_1D_E01.mp3 108.85 MB
MP3 2020/SEC511_2A_E01.mp3 80.75 MB
MP3 2020/SEC511_2B_E01.mp3 72.85 MB
MP3 2020/SEC511_2C_E01.mp3 72.79 MB
MP3 2020/SEC511_2D_E01.mp3 104.88 MB
MP3 2020/SEC511_3A_E01.mp3 76.56 MB
MP3 2020/SEC511_3B_E01.mp3 72.34 MB
MP3 2020/SEC511_3C_E01.mp3 53.17 MB
MP3 2020/SEC511_3D_E01.mp3 117.57 MB
MP3 2020/SEC511_4A_E01.mp3 80.53 MB
MP3 2020/SEC511_4B_E01.mp3 77.90 MB
MP3 2020/SEC511_4C_E01.mp3 48.29 MB
MP3 2020/SEC511_4D_E01.mp3 102.84 MB
MP3 2020/SEC511_5A_E01.mp3 79.87 MB
MP3 2020/SEC511_5B_E01.mp3 49.55 MB
MP3 2020/SEC511_5C_E01.mp3 58.00 MB
MP3 2020/SEC511_5D_E01.mp3 133.54 MB
MP3 2020/SEC511_6A_E01.mp3 45.24 MB
PDF 2020/SEC511_E01_01_16905.pdf 42.33 MB
USB 2020/Sec511 Virtual Machine.iso 13.80 GB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/1. Current State Assessment SOCs and Security Architecture.mp4 112.43 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/2. Table of Contents 1.mp4 1.30 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/3. Table of Contents 2.mp4 63.35 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/4. Course Roadmap 1.mp4 57.26 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/5. Main Topics Covered in SEC511.mp4 89.50 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/6. Current State Assessment.mp4 3.85 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/7. Defensible Network Security Architecture.mp4 2.53 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/8. Network Security Monitoring NSM.mp4 1.81 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/9. Endpoint Security Architecture.mp4 3.65 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/10. Continuous Security Monitoring CSM.mp4 1.34 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/11. CSM 2.mp4 1.43 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/12. Capstone NetWars.mp4 6.02 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/13. StartJoin the Conversation.mp4 4.08 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/14. Demos Exercises and the Capstone.mp4 10.39 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/15. Daily Immersive Cyber Challenges.mp4 513.51 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/16. Exercise EnvironmentLaptop Requirements.mp4 4.41 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/17. Courseware Conventions.mp4 397.56 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/18. Short Links.mp4 3.56 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/19. Actionable Information Immediate Results.mp4 9.06 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/20. SEC511 Course PortalWiki.mp4 165.62 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/21. SEC511 Portal Landing Page.mp4 70.22 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/22. SEC511 Portal Electronic Labs.mp4 77.32 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/23. Course Roadmap 2.mp4 135.32 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/1. Course Overview/24. SEC511 Workbook Initial Configuration and Connection.mp4 230.71 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/1. Course Roadmap.mp4 678.19 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/2. Step 1 Admit There Is a Problem.mp4 1.94 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/3. Current State Industry Studies.mp4 611.58 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/4. Mandiant MTrends.mp4 7.53 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/5. Verizon DBIR.mp4 9.47 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/6. Verizon DBIR on Detection.mp4 1.55 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/7. Ponemon Cost of a Data Breach.mp4 9.59 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/8. Credential Compromise.mp4 5.79 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/9. ThirdParty Detection.mp4 13.73 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/10. Postmortem Detection.mp4 2.34 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/11. Disrupting NationState Hackers.mp4 5.75 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/12. Quoting Rob Joyce .mp4 7.06 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/13. Beware of the Perfect Solution Fallacy.mp4 10.85 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/14. Also Beware of the Perfect Attacker Fallacy.mp4 13.08 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/2. Current State Assessment/15. Summary.mp4 109.41 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/1. Course Roadmap.mp4 1.18 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/2. Fighting a Losing Battle.mp4 3.03 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/3. No End in Sight.mp4 1.27 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/4. Definition of Winning.mp4 13.07 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/5. GoalOriented Defense.mp4 2.08 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/3. Adversarial Dominance/6. New Security Paradigm.mp4 2.35 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/1. Course Roadmap.mp4 1.67 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/2. OpportunisticHobbyist Attackers.mp4 1.38 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/3. ServiceSide Exploitation.mp4 2.19 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/4. ServiceSide Exploitation Illustrated.mp4 8.13 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/5. ServiceSide Traditionaland Current.mp4 4.12 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/6. Relatively Benign Malware.mp4 4.13 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/7. HighVolume Compromise.mp4 2.33 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/8. Advanced Denial of Service.mp4 4.05 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/9. Bots Gone Wild.mp4 969.31 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/10. Ransomware.mp4 9.73 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/11. CryptoLocker.mp4 6.60 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/4. Traditional Attack Techniques/12. Cryptolocker Screenshot.mp4 724.98 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/1. Course Roadmap 1.mp4 553.43 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/2. Traditional Cyber Defense.mp4 1.40 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/3. PreventionOriented.mp4 1.61 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/4. Prevention Sanity Check.mp4 1.42 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/5. Sanity Check Illustrated.mp4 2.46 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/6. Perimeter Focused.mp4 7.10 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/7. Addresses Layer 34.mp4 4.38 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/8. DeviceDriven Security.mp4 6.21 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/9. Traditional Successes.mp4 2.66 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/10. Course Roadmap 2.mp4 136.92 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/11. Instructor Demo Exercise 11 and 5113 Preview.mp4 113.27 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/12. Instructor Demo Security Onion.mp4 173.09 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/13. Sguil.mp4 108.74 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/14. The Sguil NSM Frontend.mp4 130.38 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/15. Wireshark.mp4 134.98 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/5. Traditional Cyber Defense/16. SEC511 Workbook Detecting Traditional Attack Techniques.mp4 149.80 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/1. Course Roadmap.mp4 580.12 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/2. Motivated Adversaries.mp4 5.13 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/3. WellFunded Adversaries.mp4 6.47 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/4. Web Application Attacks.mp4 5.10 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/5. Layer 8Social Engineering.mp4 3.19 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/6. ClientSide Exploitation Phishing Illustrated Part 1.mp4 6.57 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/7. ClientSide Exploitation Phishing Illustrated Part 2.mp4 2.05 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/8. ClientSide Exploitation Phishing Illustrated Part 3.mp4 2.38 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/6. Modern Attack Techniques/9. Why ClientSide Exploitation.mp4 2.76 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/1. Course Roadmap.mp4 138.12 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/2. ClientSide Vectors.mp4 1000.61 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/3. DBIR State of the Phish.mp4 9.54 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/4. Malicious Emails.mp4 1.53 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/5. Attaching the Evil.mp4 7.58 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/6. Phishing with Links.mp4 8.62 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/7. WebBased Delivery.mp4 2.54 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/8. Know Thy Victim.mp4 13.46 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/9. Malvertising.mp4 8.13 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/10. Watering Hole Attacks.mp4 6.98 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/11. Lets Get Physical.mp4 7.41 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/12. Mobile Small but Evil.mp4 2.22 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/13. Minnows 1.mp4 7.18 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/7. ClientSide Attack Vectors/14. Minnows 2.mp4 981.95 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/1. Course Roadmap.mp4 1.06 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/2. Common ClientSide Targets.mp4 1.11 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/3. BrowserBased Exploitation.mp4 1.55 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/4. Browser Attacks.mp4 3.48 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/5. Browser Attacks without Exploits.mp4 3.79 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/6. Browser Plugin Exploits.mp4 2.99 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/7. Flash EndofLife in 2020.mp4 5.88 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/8. File Format Attacks.mp4 1.01 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/8. ClientSide Targets/9. Maliciously Crafted Files.mp4 3.08 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/1. Course Roadmap.mp4 2.05 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/2. Advanced PostExploitation.mp4 1.55 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/3. DataDriven.mp4 865.81 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/4. Exfiltration.mp4 1.61 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/5. Encryptions Effects on Exfiltration.mp4 1.26 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/6. Lateral Movement.mp4 6.01 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/7. Pivoting Pictorially 1.mp4 3.15 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/8. Pivoting Pictorially 2.mp4 951.10 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/9. Pivoting Pictorially 3.mp4 3.98 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/10. Pivoting Pictorially 4.mp4 6.72 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/11. C2CCCNC.mp4 1.43 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/12. Persistence.mp4 3.58 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/13. Hiding.mp4 5.43 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/14. Persistence versus Hiding.mp4 1.60 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/15. Shell Meterpreter.mp4 7.09 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/9. PostExploitation/16. Meterpreter Open Source Payload Capabilities.mp4 2.60 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/1. Course Roadmap 1.mp4 1.34 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/2. Modern Cyber Defense Principles.mp4 263.60 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/3. Presumption of Compromise.mp4 4.88 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/4. DetectionOriented.mp4 1.19 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/5. Proactive Detection Threat Hunting.mp4 4.51 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/6. PostExploitation Focused.mp4 2.96 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/7. Traditional versus Modern C2.mp4 6.27 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/8. ResponseDriven.mp4 2.53 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/9. Layer 7 Aware.mp4 1.79 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/10. RiskInformed.mp4 2.65 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/11. Course Roadmap 2.mp4 139.70 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/10. Modern Cyber Defense Principles/12. SEC511 Workbook Detecting Modern Attack Techniques.mp4 60.66 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/1. Course Roadmap.mp4 1.92 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/2. Adversary Informed Detection.mp4 1.37 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/3. Threat Intelligence.mp4 2.82 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/4. Intrusion Kill Chain.mp4 1.15 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/5. Kill Chain Phases.mp4 5.81 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/6. Kill Chain ATTCK.mp4 6.99 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/7. PostExploitation Activity Is Key.mp4 1.17 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/8. PostExploitation Visibility Analysis.mp4 2.74 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/9. Stage 2 and Persistence Visibility.mp4 5.44 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/10. Mandiant MTrends Example C2 via HTTP POST.mp4 7.10 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/11. Command and Control.mp4 7.48 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/12. Pivoting Lateral Movement Analysis.mp4 1.49 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/13. Mandiant MTrends on MetasploitPSExec.mp4 2.34 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/14. The Other MS PSExec ExploitPersistC2Exfil.mp4 7.32 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/15. Data Analysis.mp4 1.23 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/16. Data Exfiltration Analysis.mp4 2.82 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/17. Default Egress Deny.mp4 5.88 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/11. Adversary Informed Detection/18. Outbound Blocking FTW.mp4 2.19 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/1. Course Roadmap.mp4 441.05 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/2. Information Overload.mp4 1.30 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/3. Security Operations Centers SOC.mp4 1.62 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/4. Not a SOC.mp4 1.12 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/5. Also Not a SOC.mp4 3.12 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/6. Purpose of a SOC.mp4 5.44 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/7. People and Process Products.mp4 10.01 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/8. Key SOC Roles.mp4 3.51 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/9. Oh Yeah Drinking the Flavored Drink Mix.mp4 3.17 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/10. Outsourcing the SOC.mp4 5.36 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/11. Making the MSSP Manage YOUR Security Services.mp4 8.02 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/12. Hidden OutSOC Costs.mp4 7.26 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/13. DIY SOC.mp4 2.29 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/14. InSOC.mp4 1.79 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/15. SOC Employee Training.mp4 3.88 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/16. Hybrid SOC.mp4 1.31 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/17. TheHive.mp4 1.40 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/18. Cortex.mp4 3.23 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/19. Relationship to Cyber Defense.mp4 4.84 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/20. SEC511 and Security Operations.mp4 1.27 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/12. Security Operations Centers/21. SOC Sounds Like There Should Be a Book About That.mp4 2.18 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/1. Course Roadmap 1.mp4 120.73 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/2. Day 1 Punch ListAction Items.mp4 99.56 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/3. Day 1 TLDR.mp4 113.91 KB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/4. Course Roadmap 2.mp4 43.22 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/5. SEC511 Workbook Egress Analysis with Elastic Stack.mp4 126.50 MB
VoD 2020/1. Current State Assessment SOCs and Security Architecture/13. Section One Summary/6. SEC511 Daily NetWars.mp4 55.93 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/1. Network Security Architecture.mp4 20.43 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/2. Table of Contents 1.mp4 35.14 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/3. Table of Contents 2.mp4 29.74 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/4. Course Roadmap.mp4 559.91 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/5. Traditional Perimeter Defense and the Crunchy Shell.mp4 4.25 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/6. What About that Soft Chewy Center.mp4 6.93 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/7. Zero Trust Architecture ZTA.mp4 9.42 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/8. BeyondCorp Googles Approach to Zero Trust.mp4 9.84 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/9. ZTA and Modern Architectures.mp4 8.91 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/10. Key Infrastructure Devices.mp4 2.48 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/11. Cyber Defense Illustrated.mp4 4.02 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/12. Caprica 6 vs the Colonies.mp4 1.44 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/13. The BSG Threat Hunting Team.mp4 473.04 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/14. Scenario 1 The Ambitious Lt Gaeta.mp4 133.66 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/15. Scenario 1 Web Application Attack.mp4 1.46 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/16. Recon Build a Targeted Wordlist.mp4 890.08 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/17. Mapping Web Server Located via Targeted DNS.mp4 1.05 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/18. Exploitation SQL Injection in Web Application.mp4 1.23 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/19. PostExploitation Data Exfiltration.mp4 3.08 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/20. Scenario 1 Web Application Attack Key Points.mp4 1.27 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/21. Scenario 2 Watering Hole ClientSide Pivot 1.mp4 856.60 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/22. Scenario 2 Watering Hole ClientSide Pivot 2.mp4 127.42 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/23. Scenario 2 Watering Hole ClientSide Pivot 3.mp4 976.49 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/24. Recon Watering Hole ID.mp4 2.83 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/25. Weaponization Watering Hole Established.mp4 1.84 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/26. Exploitation ClientSide Exploitation.mp4 279.06 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/27. PostExploitation C2 Establishment.mp4 1.51 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/28. Pivot Target Acquired.mp4 1.80 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/29. Goal Achieved Data Exfiltration.mp4 1.76 MB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/30. Scenario 2 ClientSide Pivot Key Points.mp4 115.86 KB
VoD 2020/2. Network Security Architecture/1. Network Security Architecture/31. Illustrations Applied.mp4 2.42 MB
VoD 2020/2. Network Security Architecture/2. Routers/1. Course Roadmap.mp4 841.89 KB
VoD 2020/2. Network Security Architecture/2. Routers/2. Routers.mp4 1.69 MB
VoD 2020/2. Network Security Architecture/2. Routers/3. RouterBased Detection IPFIXNetFlow.mp4 10.88 MB
VoD 2020/2. Network Security Architecture/2. Routers/4. IPFIXNetFlow Data.mp4 3.28 MB
VoD 2020/2. Network Security Architecture/2. Routers/5. Profile Outbound Flows.mp4 12.01 MB
VoD 2020/2. Network Security Architecture/2. Routers/6. Abnormal Outbound Connections.mp4 1.07 MB
VoD 2020/2. Network Security Architecture/2. Routers/7. Persistent Outbound Connections.mp4 4.39 MB
VoD 2020/2. Network Security Architecture/2. Routers/8. HighVolume Outbound Connections.mp4 8.46 MB
VoD 2020/2. Network Security Architecture/2. Routers/9. Unexpected Destinations.mp4 21.35 MB
VoD 2020/2. Network Security Architecture/2. Routers/10. Outbound Visualization.mp4 5.30 MB
VoD 2020/2. Network Security Architecture/2. Routers/11. Routers Action Items.mp4 1.24 MB
VoD 2020/2. Network Security Architecture/2. Routers/12. Routers vs Scenario 1 Web App Prevention.mp4 886.92 KB
VoD 2020/2. Network Security Architecture/2. Routers/13. Routers vs Scenario 1 Web App Detection.mp4 1010.30 KB
VoD 2020/2. Network Security Architecture/2. Routers/14. Routers vs Scenario 2 Client Prevention.mp4 2.17 MB
VoD 2020/2. Network Security Architecture/2. Routers/15. Routers vs Scenario 2 Client Detection.mp4 792.22 KB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/1. Course Roadmap.mp4 8.35 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/2. Perimeter SI Firewalls.mp4 1.03 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/3. Understanding Stateful.mp4 3.40 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/4. Default Deny Inbound.mp4 9.50 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/5. Additional Layer 3 Inbound Filtering.mp4 11.09 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/6. Default Deny Outbound.mp4 2.36 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/7. Layer 3 Outbound Filtering.mp4 2.04 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/8. Layer 4 Outbound Filtering.mp4 19.28 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/9. SI Firewall vs Scenario 1 Web App Prevention.mp4 2.42 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/10. SI Firewall vs Scenario 1 Web App Detection.mp4 130.00 KB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/11. SI Firewall vs Scenario 2 Client Prevention.mp4 6.77 MB
VoD 2020/2. Network Security Architecture/3. Perimeter SI Firewalls/12. SI Firewall vs Scenario 2 Client Detection.mp4 3.07 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/1. Course Roadmap 1.mp4 1.54 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/2. CIS 1810 Deploy Web Application Firewalls.mp4 3.75 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/3. Web Application Firewalls.mp4 4.80 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/4. WAF Capabilities.mp4 7.05 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/5. WAF PreventionDetection.mp4 7.40 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/6. WAF Deployments.mp4 11.14 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/7. WAF vs Scenario 1 Web App Prevention.mp4 2.55 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/8. WAF vs Scenario 1 Web App Detection.mp4 3.27 MB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/9. WAF vs Scenario 2 Client PreventionDetection.mp4 315.74 KB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/10. Course Roadmap 2.mp4 122.76 KB
VoD 2020/2. Network Security Architecture/4. Web Application Firewalls/11. SEC511 Workbook ModSecurity.mp4 51.55 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/1. Course Roadmap.mp4 1.77 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/2. Forward Proxies.mp4 3.19 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/3. Proxy or Bust.mp4 6.05 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/4. Proxy Configuration of Clients.mp4 6.17 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/5. WPAD.mp4 2.69 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/6. Web Content Filters.mp4 3.96 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/7. Blacklisting Billions.mp4 10.88 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/8. MIMEContentType BlockingAlerting.mp4 14.44 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/9. MIMEContentType Illustrated.mp4 1.68 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/10. Beyond Website Categorization.mp4 1.33 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/11. Splash Proxy.mp4 9.93 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/12. Forward Proxy vs Scenario 2 Client Prevention.mp4 2.96 MB
VoD 2020/2. Network Security Architecture/5. Forward Proxies/13. Forward Proxy vs Scenario 2 Client Detection.mp4 1.28 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/1. Course Roadmap.mp4 119.47 KB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/2. Encrypt All the Things.mp4 3.56 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/3. Enterprise Responses to Outbound HTTPS Encryption.mp4 8.06 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/4. CIS 1210 Decrypt Network Traffic at Proxy.mp4 3.97 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/5. Decrypting HTTPS with InterceptionInspection.mp4 5.37 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/6. Never Decrypt All The Things.mp4 5.07 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/7. Encryption Beyond HTTPS.mp4 6.53 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/8. DNS over TLS DoT.mp4 9.56 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/9. DNS Over HTTPS DoH .mp4 7.74 MB
VoD 2020/2. Network Security Architecture/6. Encryption and TLS Inspection/10. DoH DNS Request.mp4 14.03 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/1. Course Roadmap.mp4 621.86 KB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/2. Network Intrusion Detection Systems NIDS.mp4 1.93 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/3. Perimeter NIDS Placement.mp4 4.54 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/4. Other NIDS Placement.mp4 6.50 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/5. NIDS Configuration.mp4 10.70 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/6. Invisibility Analysis IDS and Trust.mp4 1.03 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/7. IDS Trust Relationships Visualized.mp4 4.87 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/8. NIDS and Prevention.mp4 935.77 KB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/9. NIDS vs Scenario 1 Web Detection.mp4 3.39 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/10. NIDS vs Scenario 2 Client Detection 1.mp4 5.07 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/11. NIDS vs Scenario 2 Client Detection 2.mp4 3.11 MB
VoD 2020/2. Network Security Architecture/7. Network Intrusion Detection Systems/12. NIDS Scenario 2 Detection FTW.mp4 6.06 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/1. Course Roadmap.mp4 122.83 KB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/2. Network Intrusion Prevention Systems NIPS.mp4 4.86 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/3. NIPS NGFW.mp4 8.06 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/4. NIPS and Detection vs Scenario 12.mp4 1.25 MB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/5. NIPS vs Scenario 1 Web App Prevention.mp4 745.97 KB
VoD 2020/2. Network Security Architecture/8. Network Intrusion Prevention Systems/6. NIPS vs Scenario 2 Client Prevention.mp4 679.98 KB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/1. Course Roadmap 1.mp4 547.35 KB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/2. NextGeneration Firewalls NGFW.mp4 1.16 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/3. Layer 7 Firewalling.mp4 3.09 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/4. SI vs NGFW Example.mp4 3.39 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/5. Application IdentificationInspection.mp4 16.93 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/6. OpenAppId.mp4 3.72 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/7. Another SI vs NGFW Scenario.mp4 6.88 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/8. User Visibility and Reputation.mp4 1.92 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/9. NGFW vs Scenario 1 Web App.mp4 787.11 KB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/10. NGFW vs Scenario 2 Client Prevention.mp4 2.80 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/11. NGFW vs Scenario 2 Client Detection.mp4 1.57 MB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/12. Course Roadmap 2.mp4 586.73 KB
VoD 2020/2. Network Security Architecture/9. NextGeneration Firewalls/13. SEC511 Workbook Application Detection and Control with Snort OpenAppId.mp4 48.82 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/1. Course Roadmap.mp4 4.91 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/2. Malware Detonation Devices.mp4 13.80 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/3. MDD Capabilities.mp4 7.53 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/4. Cuckoo Sandbox.mp4 4.26 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/5. Malwr.mp4 2.32 MB
VoD 2020/2. Network Security Architecture/10. Malware Detonation Devices/6. Malware Detonation vs Scenario 2 Client PreventionDetection.mp4 7.73 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/1. Course Roadmap.mp4 157.25 KB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/2. A Word on Entropy.mp4 3.22 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/3. High Entropy Examples.mp4 5.20 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/4. Programmatic Entropy Analysis.mp4 2.12 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/5. ent Classic Entropy Analysis.mp4 7.81 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/6. Assessing ent.mp4 7.24 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/7. Bring Out the Baggett.mp4 13.60 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/8. Get Your freqpy On.mp4 2.62 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/9. freqteststring.mp4 1.85 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/10. freqing Awesome.mp4 16.86 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/11. Domain Generation Algorithms DGAs.mp4 6.28 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/12. DGA Beyond Domain Generation Algorithms.mp4 2.57 MB
VoD 2020/2. Network Security Architecture/11. Entropy and freqpy/13. freqserverpy For freqing at Scale.mp4 7.25 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/1. Course Roadmap.mp4 460.64 KB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/2. Security Information and Event Management SIEM.mp4 6.94 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/3. Data Overload.mp4 2.97 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/4. SIEM Centralized Log Collection.mp4 2.88 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/5. DefineSIEM.mp4 2.97 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/6. Dual Stack SIEM Compliance Tactical.mp4 11.06 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/7. SIEMs Killer App Log Enrichment.mp4 4.95 MB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/8. SIEM and Prevention.mp4 301.51 KB
VoD 2020/2. Network Security Architecture/12. Security Information and Event Management SIEM/9. SIEM and Detection.mp4 2.91 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/1. Course Roadmap.mp4 3.17 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/2. Adversary Deception Devices.mp4 2.10 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/3. HoneypotsHoneynets.mp4 1.18 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/4. Traditional Honeypots.mp4 3.60 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/5. Internal Listening Honeypots.mp4 7.27 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/6. HighValue Deception.mp4 2.13 MB
VoD 2020/2. Network Security Architecture/13. Adversary Deception Devices/7. Tactical Honeypots.mp4 6.99 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/1. Course Roadmap.mp4 2.00 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/2. Switches.mp4 4.26 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/3. IPFIXNetFlow.mp4 142.71 KB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/4. VLAN ACLs VACLs.mp4 4.69 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/5. CIS 143 Disable WorkstationtoWorkstation Communication.mp4 1.63 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/6. Private VLANs PVLANs.mp4 3.80 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/7. Potential Issues with Private VLANs.mp4 3.91 MB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/8. Internal SI Firewalls.mp4 959.56 KB
VoD 2020/2. Network Security Architecture/14. SwitchesPVLAN Security/9. SwitchInternal SI Firewall and Pivoting.mp4 4.03 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/1. Course Roadmap.mp4 793.63 KB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/2. Threat Intelligence.mp4 4.36 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/3. TTPs.mp4 2.24 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/4. Kill Chain Revisited.mp4 2.85 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/5. Indicator Identification.mp4 3.73 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/6. DetectRespond Lifecycle.mp4 10.60 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/7. Dirty Word List DWL.mp4 1020.77 KB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/8. IOCs.mp4 1.86 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/9. File and URL Analysis.mp4 1.88 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/10. VirusTotal.mp4 1.29 MB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/11. Evading AV or AllClear.mp4 636.38 KB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/12. URL Analysis.mp4 1020.74 KB
VoD 2020/2. Network Security Architecture/15. Threat Intelligence/13. Other FileURL Analysis.mp4 3.00 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/1. Course Roadmap 1.mp4 8.26 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/2. Day 2 Punch ListAction Items.mp4 47.51 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/3. Day 2 TLDR.mp4 21.37 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/4. Course Roadmap 2.mp4 120.58 KB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/5. SEC511 Workbook Honeytokens for Leak Detection.mp4 134.14 MB
VoD 2020/2. Network Security Architecture/16. Section Two Summary/6. SEC511 Daily NetWars.mp4 56.04 KB
VoD 2020/3. Network Security Monitoring/1. Getting Started/1. Network Security Monitoring.mp4 1.78 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/2. Table of Contents 1.mp4 6.86 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/3. Table of Contents 2.mp4 23.77 MB
VoD 2020/3. Network Security Monitoring/1. Getting Started/4. Course Roadmap.mp4 118.83 KB
VoD 2020/3. Network Security Monitoring/1. Getting Started/5. A Note on Exercises.mp4 3.34 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/1. Course Roadmap.mp4 163.27 KB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/2. What Is Network Security Monitoring.mp4 3.80 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/3. What Is Continuous Security Monitoring.mp4 7.15 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/4. Richard Bejtlich NSM versus CSM.mp4 2.13 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/5. Its More Complicated than Threats versus Vulnerabilities.mp4 2.92 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/6. Form a Threating Hunting Team.mp4 5.80 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/7. Good Hunting.mp4 15.17 MB
VoD 2020/3. Network Security Monitoring/2. Network Security Monitoring Overview/8. Threat Hunting Team HowTo.mp4 4.30 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/1. Course Roadmap.mp4 481.39 KB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/2. Evolution of NSM.mp4 2.13 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/3. The Tao of Network Security Monitoring.mp4 2.73 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/4. NSM versus NIDS.mp4 1.52 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/5. Why Not Replace Detection with Prevention.mp4 2.11 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/6. DBIRMTrends Is Internal Detection Improving.mp4 6.37 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/7. Bejtlich South Carolina Department of Revenue DoR Case Study.mp4 4.69 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/8. Case Study NotPetya.mp4 3.09 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/9. NotPetya Financial Cost.mp4 1.67 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/10. NotPetya Effects on Ukraine.mp4 1.28 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/11. NotPetya Effects on Maersk.mp4 1.32 MB
VoD 2020/3. Network Security Monitoring/3. Evolution of NSM/12. Maersk Information Security Improvements.mp4 3.05 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/1. Course Roadmap.mp4 161.87 KB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/2. The NSM Toolbox.mp4 958.24 KB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/3. NSM Distribution.mp4 4.13 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/4. Security Onion.mp4 1.94 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/5. Security Onion Included Software.mp4 4.98 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/6. NSMNIDS Frontends.mp4 2.44 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/7. Sguil in Action I.mp4 5.56 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/8. Sguil in Action II.mp4 7.57 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/9. Sguil in Action III.mp4 11.22 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/10. NSM Toolbox Wireshark and Tshark.mp4 4.07 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/11. Wireshark.mp4 13.58 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/12. Tshark.mp4 6.02 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/13. NSM Toolbox NIDS.mp4 519.15 KB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/14. Bro Zeek.mp4 2.27 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/15. Origin of Zeek.mp4 1.51 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/16. ZeekBro Network Security Monitor.mp4 1.17 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/17. Example Difference between SnortSuricata and ZeekBro.mp4 18.82 MB
VoD 2020/3. Network Security Monitoring/4. The NSM Toolbox/18. NSM Toolbox SIEMs.mp4 2.63 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/1. Course Roadmap.mp4 1.21 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/2. Fundamental NIDS Design.mp4 1.50 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/3. Signature Matching.mp4 3.29 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/4. How Much Malware Is There.mp4 4.99 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/5. Blacklisting Is a Failed Approach.mp4 1.40 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/6. How Difficult Is Signature Evasion.mp4 1.78 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/7. Answer Not Many.mp4 163.62 KB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/8. Protocol Behavior.mp4 7.03 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/9. Anomaly Detection.mp4 7.75 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/10. Historical Anomaly Design.mp4 974.77 KB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/11. Detecting Specific Anomalies.mp4 2.24 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/12. Know Thy Network.mp4 6.77 MB
VoD 2020/3. Network Security Monitoring/5. NIDS Design/13. There Is No Easy Button.mp4 876.94 KB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/1. Course Roadmap.mp4 4.76 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/2. Analysis Methodology.mp4 5.42 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/3. Sherlock Holmes on Deduction.mp4 1.94 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/4. How This Applies to NSM.mp4 6.14 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/5. NSM Analysis Methodology.mp4 1.43 MB
VoD 2020/3. Network Security Monitoring/6. Analysis Methodology/6. Dirty Word List.mp4 1.56 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/1. Course Roadmap 1.mp4 161.68 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/2. NSM Data Sources 1.mp4 1.86 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/3. NSM Data Sources 2.mp4 465.07 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/4. Packet Data.mp4 3.09 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/5. Full Packet Capture.mp4 2.64 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/6. Storage Required for Full Packet Capture.mp4 1.75 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/7. Full Packet Capture Tools.mp4 2.22 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/8. Extracted Data.mp4 5.91 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/9. Carving Files with Wireshark Step 1 Identify the File.mp4 4.02 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/10. Step 2 Choose the Conversation and Save As.mp4 1.46 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/11. Edit the File.mp4 2.20 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/12. Save the EXE Check the File Type Hash and Scan with Antivirus.mp4 3.70 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/13. Or Use ZeekBro.mp4 3.98 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/14. String Data.mp4 2.81 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/15. Pcap Strings Example.mp4 4.54 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/16. Flow Data.mp4 3.00 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/17. Pcap Flow Example Using Tshark.mp4 1.84 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/18. Transaction Data.mp4 1.46 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/19. Transaction Data Example.mp4 8.09 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/20. Statistical Data.mp4 586.58 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/21. Alert Data.mp4 1.26 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/22. Example Sguil IDS Alert.mp4 2.65 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/23. Tagged Data.mp4 1.49 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/24. SnortSourcefire Tagging Syntax.mp4 2.09 MB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/25. Example of a Tagged Rule.mp4 470.90 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/26. Correlated Data.mp4 998.45 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/27. Course Roadmap 2.mp4 463.07 KB
VoD 2020/3. Network Security Monitoring/7. NSM Data Sources/28. SEC511 Workbook Pcap Strings and File Carving ZeekBro.mp4 174.25 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/1. Course Roadmap.mp4 498.96 KB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/2. Practical NSM Issues.mp4 857.87 KB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/3. NSM Sensors and Servers.mp4 2.12 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/4. Security Onion ServerSensor Design.mp4 6.23 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/5. Practical Issues How to Sniff.mp4 1.17 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/6. Hubs.mp4 2.99 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/7. Mirror Ports.mp4 7.58 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/8. Network Taps.mp4 5.06 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/9. Port Overload.mp4 1.62 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/10. Sniffing Virtual Traffic.mp4 1.86 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/11. NSM Sensor Placement.mp4 66.45 KB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/12. Umbrella Sensor.mp4 3.66 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/13. Sensor Placement.mp4 8.91 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/14. Practical Issues NTP.mp4 3.97 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/15. Practical Issues Time Zones and Daylight Saving Time.mp4 4.05 MB
VoD 2020/3. Network Security Monitoring/8. Practical NSM Issues/16. Spring Time Difference Between NYC London and Sydney 1.mp4 114.23 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/1. Course Roadmap 1.mp4 779.84 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/2. Cornerstone NSM.mp4 363.10 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/3. ClientSide Exploits.mp4 1.32 MB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/4. ClientSide Example.mp4 448.82 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/5. ServiceSide Exploits.mp4 2.44 MB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/6. ServiceSide Example.mp4 964.04 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/7. Course Roadmap 2.mp4 757.59 KB
VoD 2020/3. Network Security Monitoring/9. Cornerstone NSM/8. SEC511 Workbook Sguil ServiceSide Analysis.mp4 137.44 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/1. Course Roadmap.mp4 2.07 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/2. Tracking EXEs 1.mp4 1.96 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/3. Why Is This Important.mp4 1.01 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/4. Stage 2 EXE.mp4 3.66 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/5. Tracking EXEs 2.mp4 1.96 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/6. Identifying Windows EXEs.mp4 4.19 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/7. This Program Must Be Run under Win32.mp4 2.95 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/8. What Is Wrong with This Picture.mp4 6.95 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/9. Spot the Anomaly.mp4 650.02 KB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/10. CIS 12 Boundary Defense.mp4 1.18 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/11. Predictable Transfer of EXEs.mp4 2.70 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/12. Defensible Executable Transfers.mp4 1.28 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/13. How EXEs Should Not Move.mp4 3.53 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/14. NonDefensible and Suspicious Executable Flow.mp4 1.12 MB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/15. Detecting Stage 2 Downloads.mp4 537.90 KB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/16. AnomalyBased Detection Is Hard Right.mp4 665.73 KB
VoD 2020/3. Network Security Monitoring/10. Tracking EXEs/17. Targeted AnomalyBased EXE Rule.mp4 7.02 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/1. Course Roadmap.mp4 756.46 KB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/2. Identifying Command and Control Traffic.mp4 3.20 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/3. Malware Phones Home.mp4 6.14 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/4. Unencrypted pLagUe Botnet C2 Traffic.mp4 2.99 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/5. Persistent External Network Connections.mp4 3.94 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/6. Inventory Persistent External Connections.mp4 2.04 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/7. Three Categories Will Emerge.mp4 2.91 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/8. C2 Protocols.mp4 3.62 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/9. ICMP.mp4 1.91 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/10. Wireshark ICMP Example.mp4 470.28 KB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/11. SSH Tunneled via ICMP.mp4 2.45 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/12. Whitecap One Approach to Detect Malicious ICMP.mp4 13.38 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/13. Spot the C2.mp4 4.86 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/14. DNS The Ideal C2 Channel.mp4 4.62 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/15. Zeus Botnet C2 via DNS.mp4 6.34 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/16. dnscat2 and Iodine.mp4 4.13 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/17. dnscat2 Wireshark View.mp4 14.31 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/18. dnscat2 Whats Happening.mp4 1.59 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/19. dnscat2 Spotting with ZeekBro.mp4 1.03 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/20. dnscat2 The Results.mp4 1.11 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/21. Iodine Raw Tunnel.mp4 2.63 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/22. Iodine DNS Tunneling.mp4 7.03 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/23. Iodine Show Me the NULL ZeekBro.mp4 1.01 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/24. HTTP C2.mp4 2.44 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/25. HTTP POST C2.mp4 3.17 MB
VoD 2020/3. Network Security Monitoring/11. Identifying Command and Control Traffic/26. C2 POST Content.mp4 3.22 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/1. Course Roadmap.mp4 728.79 KB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/2. Tracking User Agents 1.mp4 2.67 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/3. Common User Agent Substrings.mp4 2.32 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/4. Windows Versions in User Agent Strings.mp4 2.89 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/5. Abnormal HTTP User Agents.mp4 3.28 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/6. Tracking User Agents 2.mp4 3.16 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/7. Our Approach on the Contagio Crimeware Pcap Collection.mp4 6.85 MB
VoD 2020/3. Network Security Monitoring/12. Tracking User Agents/8. Another Method Identify the Shortest UserAgents.mp4 2.27 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/1. Course Roadmap.mp4 821.58 KB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/2. C2 via HTTPS.mp4 742.91 KB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/3. NonEncrypted HTTPS 1.mp4 2.27 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/4. NonEncrypted HTTPS 2.mp4 1.75 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/5. SSLTLS without HTTPS.mp4 2.84 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/6. The HTTPS SSLTLS Handshake.mp4 1.65 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/7. Normal HTTPS.mp4 2.88 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/8. Malicious HTTPS.mp4 1016.46 KB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/9. Follow TCP Stream.mp4 2.86 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/10. Tor C2.mp4 1.49 MB
VoD 2020/3. Network Security Monitoring/13. C2 via HTTPS/11. Tor HTTPS.mp4 942.57 KB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/1. Course Roadmap.mp4 1014.04 KB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/2. Tracking Encryption Certificates.mp4 1.81 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/3. Public Key Certificates.mp4 1.37 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/4. Spot the Difference.mp4 3.31 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/5. Example X509 Certificate.mp4 1.71 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/6. Normal X509 issuer Fields.mp4 1.03 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/7. Detecting Malware.mp4 8.01 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/8. A Simple Approach to Detecting Malware via Certificates.mp4 3.89 MB
VoD 2020/3. Network Security Monitoring/14. Tracking Encryption Certificates/9. Our Approach on the Contagio Crimeware Pcap Collection.mp4 276.78 KB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/1. Course Roadmap.mp4 117.53 KB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/2. Day 3 Punch ListAction Items.mp4 39.39 MB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/3. SEC511 Workbook 5113 Final Exercise.mp4 66.19 MB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/4. SEC511 Daily NetWars.mp4 56.19 KB
VoD 2020/3. Network Security Monitoring/15. SectionThree Summary/5. Thank you.mp4 71.98 KB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/1. Endpoint Security Architecture 1.mp4 21.58 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/2. Table of Contents 1.mp4 63.22 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/3. Table of Contents 2.mp4 76.45 KB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/4. Course Roadmap.mp4 140.94 KB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/5. Endpoint Security Architecture 2.mp4 4.26 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/6. CIS Controls Critical Security Controls.mp4 5.59 MB
VoD 2020/4. Endpoint Security Architecture/1. Endpoint Security Architecture Overview/7. First Five CIS Controls.mp4 3.99 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/1. Course Roadmap.mp4 138.46 KB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/2. What We Cover.mp4 605.55 KB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/3. Endpoints More Than Windows.mp4 6.28 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/4. Endpoints More Than Desktops.mp4 7.79 MB
VoD 2020/4. Endpoint Security Architecture/2. Windows Endpoints/5. Endpoints Beyond DesktopsServers.mp4 2.16 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/1. Course Roadmap.mp4 584.09 KB
VoD 2020/4. Endpoint Security Architecture/3. Patching/2. Patching.mp4 3.02 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/3. Patch Timeline Metrics.mp4 19.55 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/4. Nation States 0days and APT Oh My.mp4 4.95 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/5. To Test or Not to Test.mp4 5.46 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/6. Patch Rinse Repeat.mp4 2.90 MB
VoD 2020/4. Endpoint Security Architecture/3. Patching/7. Modern Patching Challenges.mp4 2.18 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/1. Course Roadmap.mp4 136.29 KB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/2. Shadow Brokers Patching Hardening.mp4 2.75 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/3. Foreverday 0day.mp4 8.03 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/4. SMBv1 and the West Coast Hippy Lifestyle.mp4 4.65 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/5. CIS 51 Secure Baseline Configuration.mp4 4.70 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/6. Building a Baseline Config.mp4 1.52 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/7. How NOT to Build a Config.mp4 3.77 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/8. Center for Internet Security.mp4 3.75 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/9. CIS Benchmarks.mp4 1.54 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/10. Vendor Guides.mp4 1022.66 KB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/11. Microsoft Security Compliance Toolkit SCT.mp4 2.36 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/12. Beyond Vendors and CIS.mp4 1.21 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/13. Configuration Change Monitoring.mp4 3.14 MB
VoD 2020/4. Endpoint Security Architecture/4. Secure Baseline Configuration/14. Baseline Monitoring.mp4 8.41 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/1. Course Roadmap.mp4 692.90 KB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/2. CIS 83 EnableDeploy AntiExploitation Technologies.mp4 941.26 KB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/3. EMET.mp4 8.81 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/4. RIP EMET.mp4 5.84 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/5. EMET Features.mp4 3.64 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/6. EMET Configuration GUI.mp4 5.53 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/7. Windows Defender Exploit Guard WDEG.mp4 1.79 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/8. Windows Defender Technologies in a Table Part 1 from Minerva Labs 1.mp4 11.11 MB
VoD 2020/4. Endpoint Security Architecture/5. EMET and Windows Defender Exploit Guard/9. Windows Defender Technologies in a Table Part 2 from Minerva Labs 1.mp4 1.81 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/1. Course Roadmap 1.mp4 2.96 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/2. Application Monitoring.mp4 1.38 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/3. Log Full Command Line of All Processes.mp4 7.02 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/4. Security Event ID 4688.mp4 8.37 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/5. Command Lines to Look For.mp4 2.49 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/6. Meterpreter Payload Not So Normal.mp4 17.73 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/7. PowerShell Logging.mp4 878.33 KB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/8. Microsoft Sysinternals Sysmon.mp4 1.15 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/9. Sysmon Application Monitoring.mp4 6.22 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/10. Sysmon Capabilities.mp4 8.87 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/11. Sysmon Syntax.mp4 2.74 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/12. Example Sysmon XML Configuration.mp4 18.70 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/13. IMPHASH Hash.mp4 8.13 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/14. Sysmon Event Filtering.mp4 4.03 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/15. Sysmon Event Filtering II.mp4 1.97 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/16. Detecting Unusual and Unsigned Drivers and Images with Sysmon.mp4 6.11 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/17. BeltandSuspenders Detective Whitelisting Process.mp4 8.43 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/18. DeepWhite.mp4 4.13 MB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/19. Course Roadmap 2.mp4 145.43 KB
VoD 2020/4. Endpoint Security Architecture/6. Application Monitoring and Sysmon/20. SEC511 Workbook Sysmon.mp4 139.32 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/1. Course Roadmap.mp4 1.32 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/2. CIS 27 Utilize Application Whitelisting.mp4 754.42 KB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/3. Application Whitelisting.mp4 669.51 KB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/4. Application not file Whitelist.mp4 4.88 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/5. The Whitelist.mp4 12.40 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/6. Whitelist Integrity.mp4 2.14 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/7. Typical Flow of Executables.mp4 1.36 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/8. Acquiring Innocuous Binaries.mp4 1.84 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/9. Evil Executable Propagation.mp4 1.32 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/10. Identification of Source.mp4 12.69 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/11. ZoneIdentifier.mp4 1.26 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/12. Whitelisting Administrative Overhead.mp4 5.27 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/13. Phase 0 Whitelist Building.mp4 555.37 KB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/14. NSRL RDS Reference Dataset.mp4 2.73 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/15. FieldedSystem Executables.mp4 5.03 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/16. PreFielded System Executables.mp4 2.58 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/17. Trusting Signed Binaries by Specific Vendors.mp4 2.85 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/18. NIST Special Publication 800167 Guide to Application Whitelisting.mp4 1.18 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/19. Hybrid Approach.mp4 2.86 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/20. Phase 1 Targeted Detection.mp4 4.36 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/21. TrueFalse Positive.mp4 2.67 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/22. Phase 1 Duration.mp4 1.18 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/23. Phase 2 Strict Enforcement.mp4 2.57 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/24. Blocking Detection.mp4 4.00 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/25. Trusted Binaries.mp4 1.04 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/26. Previously Trusted Binaries.mp4 3.36 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/27. Hash Bypass.mp4 2.72 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/28. Arent advanced attackers moving towards code and DLL injection.mp4 1.50 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/29. Advanced Application Whitelisting.mp4 1023.16 KB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/30. Linux AppArmor.mp4 1.07 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/31. Software Restriction Policies.mp4 2.27 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/32. AppLocker.mp4 1.46 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/33. AppLocker Phase 0 Rule Creation.mp4 3.82 MB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/34. AppLocker Phase 1 Audit Only.mp4 554.62 KB
VoD 2020/4. Endpoint Security Architecture/7. Application Whitelisting/35. Audit Only Mode.mp4 286.62 KB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/1. Course Roadmap.mp4 3.72 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/2. Inevitable Exploitation.mp4 3.62 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/3. Adversary Privilege.mp4 2.27 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/4. Privileged Accounts.mp4 280.54 KB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/5. Administrative Accounts.mp4 1.67 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/6. How Many Administrative Accounts.mp4 4.06 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/7. What Does Admin Mean.mp4 4.23 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/8. RightsPermissions.mp4 2.55 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/9. Builtin Administrator.mp4 11.66 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/10. Builtin Administrator Passwords.mp4 3.73 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/11. Local Administrator Password Solution LAPS.mp4 9.95 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/12. Service Accounts.mp4 11.16 MB
VoD 2020/4. Endpoint Security Architecture/8. Administrative Accounts/13. LSA Secrets.mp4 3.95 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/1. Course Roadmap 1.mp4 515.70 KB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/2. Privileged Account Monitoring.mp4 2.34 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/3. NTFS Permissions.mp4 1.89 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/4. exploitwindowslocalservicepermissions.mp4 3.68 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/5. User Rights and Privileges.mp4 5.42 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/6. Key User Rights.mp4 2.24 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/7. Key Privileges.mp4 11.32 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/8. Persistence.mp4 4.28 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/9. ASEPs.mp4 2.25 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/10. Autoruns.mp4 1.93 MB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/11. Course Roadmap 2.mp4 134.49 KB
VoD 2020/4. Endpoint Security Architecture/9. Privilege Monitoring/12. SEC511 Workbook Autoruns.mp4 103.94 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/1. Course Roadmap.mp4 2.22 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/2. Reducing Privileges.mp4 5.73 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/3. UAC Less Privilege Is More Security.mp4 4.64 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/4. But Im an Admin.mp4 4.57 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/5. Loser PowerShell.mp4 836.99 KB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/6. Admin Unelevated PowerShell.mp4 4.70 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/7. Admin Elevated PowerShell.mp4 5.98 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/8. Magic Local Admin.mp4 1.40 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/9. No More UAC Bypassing Magic Admin.mp4 1.00 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/10. Process Monitor.mp4 11.93 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/11. Process Monitor Access Denied.mp4 618.88 KB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/12. Application Compatibility Toolkit ACT.mp4 3.42 MB
VoD 2020/4. Endpoint Security Architecture/10. Privilege Reduction/13. LUA Buglight.mp4 1.16 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/1. Course Roadmap.mp4 4.01 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/2. Authentication.mp4 1.41 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/3. Passwords.mp4 1.38 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/4. Password ReuseSynchronization.mp4 7.31 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/5. Windows Password Hashes.mp4 1.45 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/6. Windows A Low Sodium Architecture.mp4 9.44 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/7. No Salt Illustrated.mp4 8.57 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/8. LMLaMe.mp4 12.00 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/9. Is LM Finally behind Us.mp4 2.63 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/10. NT.mp4 5.22 MB
VoD 2020/4. Endpoint Security Architecture/11. Authentication/11. Password Storage.mp4 5.84 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/1. Course Roadmap.mp4 665.88 KB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/2. Security Support Provider SSP.mp4 4.65 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/3. SSP Impact of Single SignOn.mp4 3.81 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/4. SSP WDigest.mp4 3.72 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/5. WDigest FAIL.mp4 830.39 KB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/6. Microsoft Live Accounts LiveSSP.mp4 1.38 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/7. Microsoft Account Password Lengths and Truncation.mp4 12.33 MB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/8. Lets Try That Again.mp4 651.80 KB
VoD 2020/4. Endpoint Security Architecture/12. Security Support Provider/9. LiveSSP FAIL.mp4 3.85 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/1. Course Roadmap.mp4 669.39 KB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/2. PostAuthentication.mp4 2.47 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/3. Logon Types.mp4 3.47 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/4. Access Tokens.mp4 4.25 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/5. Token Impersonation Levels.mp4 1.26 MB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/6. Impersonate Tokens.mp4 601.71 KB
VoD 2020/4. Endpoint Security Architecture/13. PostAuthentication/7. Delegate Tokens.mp4 5.02 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/1. Course Roadmap.mp4 541.01 KB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/2. PasstheHash.mp4 8.23 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/3. Token Smuggling Pass the Session.mp4 3.86 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/4. Pass the Password.mp4 3.49 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/5. Mandiant MTrends on Mimikatz.mp4 1.71 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/6. The Sed Persistent Threat SPT.mp4 5.97 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/7. This Dog Can Hunt.mp4 904.27 KB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/8. WhackaMole.mp4 758.79 KB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/9. Announcing Mimiyakz The Sed Persistent Threat SPT Strikes Again.mp4 2.53 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/10. Advanced Authentication Attack Mitigations.mp4 17.91 MB
VoD 2020/4. Endpoint Security Architecture/14. Advanced Authentication Attacks/11. MultiFactor Authentication MFA.mp4 3.70 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/1. Course Roadmap 1.mp4 1.99 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/2. Endpoint Protection Platforms EPP.mp4 14.63 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/3. EPP AntivirusAntimalware.mp4 3.19 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/4. EPP HostBased Firewall CIS 94.mp4 192.02 KB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/5. Windows Defender Firewall.mp4 4.75 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/6. Default WDFAS.mp4 1.18 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/7. Not Windows Defender Firewall.mp4 2.55 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/8. Course Roadmap 2.mp4 138.95 KB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/9. ASD Mitigation Strategy HostBased IDS.mp4 1.27 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/10. HostBased IDS.mp4 3.63 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/11. Gains from HIDS.mp4 1.45 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/12. Approaches to HIDS.mp4 1.98 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/13. Detection without Response.mp4 4.58 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/14. ASD Mitigation Strategy Endpoint Detection and Response.mp4 2.21 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/15. Endpoint Detection and Response EDR.mp4 9.88 MB
VoD 2020/4. Endpoint Security Architecture/15. Endpoint Protection Platforms EPP/16. Host Detection without HIDSEDR.mp4 2.24 MB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/1. Course Roadmap 1.mp4 41.24 MB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/2. Day 4 Punch ListAction Items.mp4 113.02 KB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/3. Day 4 TLDR.mp4 114.40 KB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/4. Course Roadmap 2.mp4 144.54 KB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/5. SEC511 Workbook AppLocker.mp4 52.73 MB
VoD 2020/4. Endpoint Security Architecture/16. Section 4 Summary/6. SEC511 Daily NetWars.mp4 56.33 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/1. Automation and Continuous Security Monitoring.mp4 16.87 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/2. Table of Contents 1.mp4 52.77 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/3. Table of Contents 2.mp4 78.89 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/4. Course Roadmap.mp4 132.62 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/5. What Is Continuous Security Monitoring.mp4 3.11 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/6. Acronym Soup.mp4 2.84 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/7. The US Government and Continuous Monitoring.mp4 1.01 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/8. DoD Risk Management Framework.mp4 9.93 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/9. Bejtlich on RMF.mp4 7.05 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/10. Department of Homeland Securitys CDM.mp4 10.69 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/11. Bejtlich on CDM.mp4 709.22 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/12. NIST SP 800137.mp4 814.44 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/13. NIST Special Publication 800137.mp4 1.04 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/14. NIST SP 800137 Automation Domains.mp4 17.51 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/15. NIST SP 800137 What to Do Not How to Do It.mp4 610.36 KB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/16. Spotting the Adversary with Windows Event Log Monitoring Version 2.mp4 3.55 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/17. The US Governments Take on CSM Lessons Learned.mp4 2.72 MB
VoD 2020/5. Automation and Continuous Security Monitoring/1. Continuous Security Monitoring Overview/18. Our Approach to CSM.mp4 1.42 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/1. Course Roadmap.mp4 575.60 KB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/2. Industry Best Practices.mp4 4.00 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/3. CIS Controls.mp4 3.20 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/4. ASD Strategies to Mitigate Cyber Security Incidents.mp4 2.16 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/5. Top 4 Mitigation Strategies.mp4 10.02 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/6. ASD Essential Eight Prevent Malware Delivery and Execution.mp4 8.51 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/7. ASD Essential Eight Limit Extent of Incidents.mp4 719.79 KB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/8. ASD Essential Eight Recover Data and System Availability.mp4 2.34 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/9. The ASD Top 4 Focus on Prevention.mp4 2.21 MB
VoD 2020/5. Automation and Continuous Security Monitoring/2. Industry Best Practices/10. ASD Mitigation Strategies to Detect and Respond.mp4 14.69 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/1. Course Roadmap.mp4 562.92 KB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/2. Winning CSM Techniques.mp4 435.71 KB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/3. Monitoring a NonDefensible Network.mp4 11.65 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/4. Focus on Critical Systems and Data.mp4 7.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/5. FIPS 199 on SBU Classification.mp4 1.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/6. Data Classification HowTo.mp4 3.31 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/7. High Data in All the Wrong Places.mp4 5.64 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/8. Protect High Data.mp4 2.12 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/9. Windows Data Classification Tools.mp4 9.43 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/10. Detecting Change.mp4 916.21 KB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/11. Solve Problems as They Are Discovered.mp4 3.77 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/12. The Broken Windows Theory.mp4 6.47 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/13. Broken Windows Theory of Defensible Networks.mp4 2.25 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/14. Key CSM Technique Long Tail Analysis.mp4 2.39 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/15. The Long Tail 1.mp4 18.54 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/16. Lets Try Long Tail Analysis on Windows Security Logs.mp4 50.81 MB
VoD 2020/5. Automation and Continuous Security Monitoring/3. Winning CSM Techniques/17. The Long Tail 2.mp4 72.41 KB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/1. Course Roadmap.mp4 135.71 KB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/2. Maintaining Situational Awareness.mp4 9.80 MB
VoD 2020/5. Automation and Continuous Security Monitoring/4. Maintaining Situational Awareness/3. Useful Sites.mp4 1.23 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/1. Course Roadmap 1.mp4 1.13 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/2. Know Thy Software.mp4 1.64 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/3. Cant Secure What You Dont Have or Dont Know You Have.mp4 1.94 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/4. Inventory and Control of Hardware Assets.mp4 475.23 KB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/5. Inventories.mp4 2.20 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/6. Asset Inventory.mp4 1.67 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/7. Host Port and Service Discovery.mp4 1.82 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/8. Active Scanning.mp4 748.02 KB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/9. Always Test.mp4 10.21 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/10. Nmap.mp4 1.26 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/11. Ndiff.mp4 2.62 MB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/12. Course Roadmap 2.mp4 135.96 KB
VoD 2020/5. Automation and Continuous Security Monitoring/5. Host and Service Discovery/13. SEC511 Workbook Inventory.mp4 27.74 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/1. Course Roadmap 1.mp4 6.05 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/2. Passive Host Discovery.mp4 11.60 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/3. Passive Scanning.mp4 4.57 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/4. p0f version 3.mp4 6.28 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/5. PRADS.mp4 3.63 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/6. Raw PRADS Log View in Gnumeric Spreadsheet.mp4 806.89 KB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/7. Lets Clean That Up a Bit.mp4 455.19 KB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/8. CleanedUp Output.mp4 1.58 MB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/9. Course Roadmap 2.mp4 119.55 KB
VoD 2020/5. Automation and Continuous Security Monitoring/6. Passive OS Detection/10. SEC511 Workbook p0f v3.mp4 31.04 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/1. Course Roadmap.mp4 134.25 KB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/2. Vulnerability Scanning.mp4 4.64 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/3. CIS 31 Vulnerability Scanning.mp4 4.43 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/4. Security Content Automation Protocol SCAP.mp4 3.08 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/5. OpenVAS.mp4 3.25 MB
VoD 2020/5. Automation and Continuous Security Monitoring/7. Vulnerability Scanning/6. VulnWhisperer.mp4 6.00 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/1. Course Roadmap.mp4 2.56 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/2. Monitoring Patching.mp4 888.17 KB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/3. Standalone Microsoft Patch Scanning.mp4 3.42 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/4. GetMissingUpdates.mp4 2.28 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/5. Linux Patch Compliance.mp4 4.25 MB
VoD 2020/5. Automation and Continuous Security Monitoring/8. Monitoring Patching/6. Quick and Dirty Linux Patch Checks.mp4 4.86 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/1. Course Roadmap.mp4 602.06 KB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/2. Monitoring Service Logs.mp4 7.16 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/3. CIS 87 Malware Defenses.mp4 1.10 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/4. Check Your DNS.mp4 3.03 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/5. Enable DNS Query Logging on Windows 20082012.mp4 3.23 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/6. DNS Analytical Logging on Windows 2012R2.mp4 7.25 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/7. Enable Query Logging on Bind 9.mp4 484.61 KB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/8. Enable Response Logging on Bind 9.mp4 1.99 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/9. Now Were Logging DNS Whats Next.mp4 10.37 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/10. DNS over HTTPS DoH and DNS over TLS DoT.mp4 1.53 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/11. DoH and DoT.mp4 1.74 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/12. FirefoxDoH.mp4 5.47 MB
VoD 2020/5. Automation and Continuous Security Monitoring/9. Monitoring Service Logs/13. ChromeDoH.mp4 4.08 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/1. Course Roadmap.mp4 918.40 KB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/2. Monitoring Change in Critical Devices and Appliances.mp4 1.72 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/3. Two Approaches to Detect Device Change.mp4 2.13 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/4. BuiltIn Change Detection Cisco Routers.mp4 2.29 MB
VoD 2020/5. Automation and Continuous Security Monitoring/10. Monitoring Change to Devices and Appliances/5. HowTo Configuration Change Notification and Logging.mp4 505.48 KB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/1. Course Roadmap.mp4 770.38 KB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/2. Leveraging Proxy and Firewall Data.mp4 1.67 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/3. CIS 129 Boundary Defense.mp4 644.85 KB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/4. Mandatory Proxies.mp4 1.83 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/5. Proxies Rule.mp4 2.96 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/6. Behavioral Proxy Checks.mp4 3.74 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/7. Case Study Naked Downloads.mp4 2.23 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/8. Proxies Allow Easy Detection of C2.mp4 2.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/9. Leveraging Firewall Logs.mp4 2.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/10. CIS 6 Audit Logs.mp4 1.69 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/11. Bots Love Spam.mp4 11.53 MB
VoD 2020/5. Automation and Continuous Security Monitoring/11. Leveraging Proxy and Firewall Data/12. Which Outbound Ports to BlockLogAlert.mp4 2.23 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/1. Course Roadmap 1.mp4 462.64 KB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/2. Monitoring Critical Windows Events.mp4 6.78 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/3. Windows Event Log Locations.mp4 5.36 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/4. Damaged Windows Event Logs.mp4 3.49 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/5. Viewing Windows Security Event Logs.mp4 1.58 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/6. Exporting Event Logs.mp4 1.33 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/7. Critical Windows Event to Monitor.mp4 4.83 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/8. Detecting Malice via Windows Events.mp4 1.14 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/9. Critical Event 1 CommandLine Auditing.mp4 3.84 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/10. Local View Meterpreter Payload.mp4 10.19 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/11. Critical Event 2 Service Creation.mp4 1.39 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/12. Event IDs 7045 and 4697 normal Service Creation.mp4 1.94 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/13. Attacker Uses Metasploit PsExec Exploit.mp4 6.81 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/14. How Does This Differ from Normal PsExec.mp4 1.20 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/15. System Event ID 7045 Sysinternals versus Metasploit PsExec.mp4 3.92 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/16. System Event ID 7030 Track Errors.mp4 1.61 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/17. A Word on Scripting and Automation.mp4 1.35 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/18. Critical Event 3 User Creation.mp4 2.83 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/19. Event Viewer Security Log View net user sec511 sekrit add.mp4 1.99 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/20. Critical Event 4 Adding Users to Privileged Groups.mp4 2.43 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/21. Event Viewer Security Log View net localgroup administrators sec511 add.mp4 773.96 KB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/22. Tracking Changes to Domain Groups.mp4 1.00 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/23. Critical Event 5 Clearing Event Logs.mp4 4.69 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/24. Critical Event 6 Terminal Services Certificate Creation.mp4 2.17 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/25. Event Viewer System Log View.mp4 2.81 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/26. Critical Event 7 External Media Detection.mp4 3.07 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/27. Event Viewer System Log View New USB Drive.mp4 2.43 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/28. Critical Event 8 Disabling the Firewall.mp4 2.80 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/29. Event Viewer View Disabling the Firewall.mp4 1.85 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/30. Adding Specific Firewall Rules.mp4 2.25 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/31. Critical Event 9 Detecting Lateral Movement.mp4 10.02 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/32. Use of Local versus Domain Credentials.mp4 2.87 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/33. Track the Use of Local Credentials via the Network.mp4 7.52 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/34. PasstheHash Detection.mp4 1.61 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/35. Attacker View Metasploit PsExec PasstheHash 1.mp4 8.44 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/36. Attacker View Metasploit PsExec PasstheHash 2.mp4 763.74 KB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/37. Didnt Microsoft Fix This.mp4 7.83 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/38. PasstheHash and Lateral Movement Mitigation.mp4 1.83 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/39. Critical Event 10 AppLocker Alerts.mp4 1.36 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/40. Critical Event 11 EMET Alerts.mp4 1.18 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/41. Summary Critical Windows Events to Monitor.mp4 1.65 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/42. Course Roadmap 2.mp4 1.07 MB
VoD 2020/5. Automation and Continuous Security Monitoring/12. Monitoring Critical Windows Events/43. SEC511 Workbook Windows Event Logs.mp4 38.44 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/1. Course Roadmap.mp4 2.47 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/2. Importance of Automation.mp4 2.52 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/3. Automation Example Windows Startup Registry Keys.mp4 1.67 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/4. What Does a Malicious Startup Registry Key Look Like.mp4 1.15 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/5. Windows Registry Startup Keys.mp4 2.54 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/6. Remotely Accessing Registry Keys.mp4 855.80 KB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/7. Example PowerShell Script.mp4 2.29 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/8. Next Step Long Tail Analysis.mp4 4.08 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/9. Then Automate.mp4 1.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/10. DeepBlueCLI.mp4 6.11 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/11. DeepBlueCLI Partial List of Detected Events.mp4 2.43 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/12. DeepBlueCLI Regex Matching Command Lines.mp4 1.65 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/13. DeepBlueCLI Whitelist.mp4 1.62 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/14. DeepBlue CLI Base64 andor Compressed Commands.mp4 1.16 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/15. Use Case Petya.mp4 1.29 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/16. Use Case SamSam Spreading via WMI and PsExec.mp4 2.55 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/17. Test PowerShell Command.mp4 6.84 MB
VoD 2020/5. Automation and Continuous Security Monitoring/13. Scripting and Automation/18. Use Case DeepBlueCLI vs PowerShell via WMIC and PsExec.mp4 2.23 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/1. Course Roadmap.mp4 1.06 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/2. PostIntrusion Detection.mp4 1.96 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/3. Memory Analysis.mp4 2.80 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/4. Redline.mp4 2.76 MB
VoD 2020/5. Automation and Continuous Security Monitoring/14. PostIntrusion Detection/5. Kansa Go BigWide or Go Home.mp4 6.71 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/1. Course Roadmap.mp4 1.33 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/2. Day 5 Punch ListAction Items.mp4 26.34 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/3. SEC511 Workbook Persistence and Pivoting.mp4 75.73 MB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/4. SEC511 Daily NetWars.mp4 56.82 KB
VoD 2020/5. Automation and Continuous Security Monitoring/15. Section 5 Summary/5. Thank You.mp4 65.34 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/1. Appendix Centralize Windows Event Logs MBSA.mp4 137.98 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/2. Configuring Centralized Windows Event Log Collection.mp4 104.82 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/3. Collectors and Sources.mp4 110.22 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/4. Configuring Centralized Logging 1.mp4 114.30 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/5. Configuring Centralized Logging 2.mp4 101.61 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/6. Create Two Groups.mp4 111.79 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/7. Add Computers to Groups.mp4 114.49 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/8. Windows Remote Management.mp4 91.67 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/9. Enable the Windows Event Collector.mp4 91.55 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/10. Creating the Subscription in Event Viewer.mp4 82.00 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/11. Choose Events.mp4 75.88 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/12. Complete Subscription.mp4 93.15 KB
VoD 2020/5. Automation and Continuous Security Monitoring/16. Appendix Centralize Windows Event Logs MBSA/13. Default Windows Vista and Newer Settings.mp4 85.92 KB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/1. Section 6 Capstone Design Detect Defend.mp4 4.36 MB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/2. Capstone Overview.mp4 52.76 MB
VoD 2020/6. Capstone Design Detect Defend/1. Capstone Design Detect Defend/3. Section 6 Continuous Monitoring and Security Operations Capstone.mp4 1206.56 MB
No trackers found

TorrentBank
Copyright © 2024